Skip to main content

Full text of "Silent Massacre MKultra Monarch HAARP Israel NWO illuminati Freemasons"

See other formats


1 


THE SILENT MASSACRE 

ELECTRONIC TORTURE AND MIND CONTROL IN THE UNITED 
STATES OF AMERICA AND LAW ENFORCEMENT COMPLICITY 

(Max H. Williams, Monroe, Louisiana, USA, 2008-2009) 

Author’s Note 

In recent years, scientists have learned how to locate, focus on, and lock onto a 
person’s brain by remote to manipulate that person’s thoughts and thus his actions. 
Mind control assaults now loom as one of the main challenges of the 21 st century. The 
targeted person often never discovers that he has become a mind control victim, and 
he ends up hurting others, taking his own life, or simply becoming another “Alzheimer” 
statistic. This paper discusses some of the elements of what I call electronic stalking 
and mind control (ESMC). 

While writing this paper, the people who monitor me electronically and continually 
interfere with my computer and emails and tap my phones often entered my PC to 
make changes in the narrative to discourage me and try to make me look crazy. 
Keeping the paper intact and ensuring accuracy have been a constant battle. Even 
now, after finishing the paper, when I go back to add a salient point, I often find that a 
portion has been altered or deleted. Powerful forces do not want papers such as this 
one written and disseminated. 

Fortunately the internet brings together targeted individuals (TIs) of electronic torture 
and mind control from all conceivable backgrounds. Race and ethnicity, color, gender, 
religion, politics, philosophical views, and all other human characteristics and thought 
fade into obscurity as targets unite to conquer their unseen enemies. This paper is 
written principally for those victims. 

Some readers may find this paper objectionable when I talk about who initiated my 
ESMC and who probably continues to manage it by proxy. Nevertheless, I hope that 
the reader can get past those objections and read the entire content. Targeted 
individuals will readily identify with what I talk about in this paper. Those who are not 
TIs but who are intellectually curious about electronic and mind control assault will 
learn much about a sick attack on tens of thousands of targets that also indirectly 
affects everybody in those targets’ lives. 

The human resources and the enormous cost required to carry out electronic stalking 
and mind control, re-enforced in many cases by gang stalking, almost certainly limit its 
use to governments. Only governments can mobilize the enormous outlay of funds 
and successfully camouflage the use of those funds. Only governments have the 
sophisticated equipment and computers required for electronic abuse and mind 
control. Only governments can train in secrecy the cadre of handlers who administer 
the electronic assault and mind control activities, using deception and psychology. 
Even mega corporations and businesses would not be able to carry out electronic 
assault and mind control in secrecy unless they did so under cover of government 



2 


work and with government protection. Several countries, including the United States 
of America, have experimented with directed energy weaponry and mind control for 
many years. 


Background 

Everybody who realizes that he has become a targeted individual for electronic 
stalking and mind control has his story. However, he usually has no idea who might 
have targeted him. In my case, overwhelming evidence points clearly to the 
perpetrators of my electronic stalking and mind control. The Israelis or pro-Israel 
elements of the U. S. Government targeted me in a South American country no later 
than the mid-1970’s. Let me back up to explain. 

I was working for the U. S. Government in South America when the 1973 Arab-lsraeli 
War broke out. As a Ph.D. in history, I like to do my own analyses of events instead of 
accepting the media’s and the government’s versions; thus, I began looking into the 
background of the conflict, including all three Arab-lsraeli Wars. 

While conducting research, I became intrigued by Israel’s air attack on the U.S.S. 
Liberty during the 1967 Arab-lsraeli War. In that attack, Israel used unmarked aircraft, 
supported by Israeli torpedo boats, to strafe and bomb the Liberty, killing thirty-seven 
American sailors. (In contrast, the attack on the U.S.S. Cole in 2000 by Arab 
extremists killed only seventeen American sailors. Guess which incident the media 
played up.) Investigators found that Israel clearly knew that the plainly-marked Liberty 
was American and sought to blame their attack on Egypt; nevertheless, the United 
States accepted Israel’s claim that it was an accident. 

As a result of my research on Arab-lsraeli relations, I came to see that Israel was not 
at all the poor beleaguered nation that U. S. media portrayed but instead pursued 
internal and foreign policies that caused almost all of the Middle East problems. I also 
realized for the first time that the media in the United States skews information 
concerning Israel to place that nation in the most favorable light. On the other hand, it 
rarely if ever says anything positive about Arabs or Moslems. 

Shortly after my “enlightenment,” pro-Israel Americans with whom I worked started 
testing my views. Were it not for their attempts to intimidate me, I may have become 
only moderately anti-Israel. As it was, I became increasingly vocal in expressing my 
condemnation of Israel’s policies. 

One day as I left from work and was walking home, a swarthy, middle-aged, rather 
short man fell into step with me on the crowded sidewalk. He sidled up closer to me 
as we walked and said in a perfectly American-sounding accent, “The Jews control 
the United States.” Completely taken aback by his statement, I stammered my 
protests. Then, just as suddenly as he had appeared, he disappeared into the crowd. 
No inhabitant of that country would have had the slightest interest in my feelings 



3 


about Jews. The man was probably either Israeli or a pro-Israel agent of United 
States intelligence. That encounter strangely coincided with an official visit to that 
country by an American Jew from the Department of State who had close ties to 
Israel. 

Only recently have I remembered that in that same country in about 1976 or 1977, I 
was suddenly struck with a sense of unnatural overwhelming gloom while in my 
bedroom at night before retiring. I had always been an optimistic, outgoing person and 
had never had feelings of that type. The sensation returned time after time. In 
retrospect, I believe that somebody was either attempting to take over my mind or that 
it had already been “hooked.” The perpetrators were doubtlessly trying to induce 
anxiety. (More about that later.) The undeveloped country in which I was working had 
absolutely no reason or the wherewithal to target me. 

In 1978, I was assigned to a different South American country. One of the national 
employees who worked in my section was a Jewish woman who had worked with the 
Israeli Consulate before that office closed, and then she began working with the U. S. 
representation in that country. One day when I had a problem with a molar, I asked 
that person to recommend a dentist. She referred me to an older German Jewish 
"dentist," who supposedly did a root canal on that tooth. An older woman, perhaps his 
wife, served as his assistant in a stark room of their dark, unpleasant-looking 
residence. 

After retirement, in the 1990's, I went to an American dentist with problems with the 
same molar on which the South American dentist had supposedly performed the root 
canal. The local dentist found in the tooth a tiny cylindrical pin-like object. At the time, 

I thought little of it. However, now in retrospect, that little object had to be a tiny "bug." 
The South American dentist also wanted to place a filling in-between my two front 
teeth, claiming that there was decay between the teeth. He obviously intended to 
implant an incredibly tiny camera in that location, for thirty years later those two 
teeth remain perfectly sound. 

I liked the employee who recommended the dentist, and at the time I had no reason at 
all to doubt that she was just a nice, friendly national employee who happened to be 
Jewish and who happened to find work with the U. S. Government. When other 
employees reported to me that she got to the office early in the morning before I 
arrived to go through the papers in my desk, I dismissed those charges as simply 
tales manufactured out of jealousy. After I left the country for another assignment, that 
employee lost her job. Although I had given her excellent performance evaluations, 
she told others that I caused her to be fired. In actuality, I did not find out that she had 
been dismissed until much later. In hind sight, I believe that her guilt convinced her 
that I had found out about her duplicity. Apparently that employee did not stop working 
with the Israelis when she took the job with the U. S. Government. 



4 


In the 1970’s, Israeli Nazi hunters were still active in South America. The “dentist” 
probably worked with them, and the employee in my office may have also cooperated 
in the hunt. One of the contractors who worked with the American Government and 
who alternated between Argentina and the country in which I was assigned was 
known to be associated with that group. The U. S. Government, in fact, cooperated 
with and helped fund the Nazi hunters. The “Nazis” probably included anybody who 
opposed Israel and its pro-Israel factions. 

The minuscule device implanted by the dentist in South America in the late 1970’s 
may have had only limited capability. It was undoubtedly used to listen to my 
conversations as well as perhaps to track my movements. Since that time, however, 
much more sophisticated, high-tech, intelligence-gathering and mind control 
equipment and software have been developed, tested, and put into operation. 

Over the years, I have continued to speak out against Israel’s foreign policy and our 
support for it. In the 1970’s, I defended the Palestine Liberation Organization (PLO) 
when it was still considered a renegade group, and in 1984 I became a member of the 
American-Arab Anti-Discrimination Committee at a time when Americans were being 
led by the U. S. media down the anti-Moslem path. I never occupied an important 
decision-making position in the government; yet, to the Israelis, an enemy is an 
enemy, regardless of his rank. I articulate my thoughts, and my friends respect my 
opinions. Thus, I am a threat. 

In the early to mid-1980’s, I served in Washington, DC, where my anti-Israel views 
became widely known in my work venue. In that city, I subscribed to a small, openly 
anti-Israel newspaper called The Spotlight, which often relayed negative doings by 
Israel that would never have been published in the mainline media. Every subscriber 
to The Spotlight, now defunct, got a place on the pro-Israel hit list. While in 
Washington, the IRS, which represents a very powerful pro-Israel tool of the 
powerbrokers, audited me twice consecutively. 

In 1985, I was reassigned to an African post. Several years later, on the eve of the 
Gulf War, when it looked like President George Bush (the elder) planned to attack 
Saddam Hussein, I objected to that action. Taking advantage of a process known as 
the “dissent channel,” in which American government employees abroad may express 
opposition to U. S. foreign policy, I sent several cables to the Secretary of State. In 
those cables, I stated my opposition to the war and charged that the principal reason 
for the U. S. attacking Hussein was not to assist Kuwait but to fight a proxy war for 
Israel to maintain Israeli hegemony in the Middle East. However, the media had 
already pumped up the American public to support the so-called Gulf War. I was 
among only a handful of thoughtful Americans who opposed that war, and I am quite 
sure that my opposition became duly noted by pro-Israel factions within U. S. 
intelligence as well as the Israelis. Those people doubtlessly placed me on a “watch” 
list. 



5 


My cables criticizing both the U. S. and Israel for their Middle East policies may have 
triggered much more advanced electronic surveillance. My hind-sight observations tell 
me that probably in the early 1990’s pro-Israel elements within the FBI took over my 
surveillance from the original perpetrators when I retired and returned to the United 
States, probably on the pretended grounds that I was a subversive and a suspected 
terrorist. Their mind control assault on me probably began in the late 1980’s or 
early- 1990’s and increased in intensity over the last ten to fifteen years. 

In thinking back over events, I recall that in Africa in the late 1980’s, I heard at night 
while trying to sleep what sounded like a ball being bounced on a hard surface. I 
asked the night watchman if he had been bouncing a ball, perhaps out of boredom, 
and he told me that he had not. I knew that he was telling me the truth. Very obviously 
the sounds were intended to disturb my sleep or they were inadvertently done by the 
device used to monitor me. In other words, I had already been targeted for mind 
control. 

When I retired in 1991, I continued speaking out against Israel in conversations with 
friends and in letters to editors of newspapers. I knew that elements in U. S. 
intelligence loyal to Israel had placed me on their hit list and that they were following 
my activities. After retiring, I continued to travel abroad occasionally, usually to 
Central America, where I owned property. Once when I returned to the Houston 
international airport from one of the trips, a rookie immigration official processed my 
entry. A veteran officer stood nearby. When the rookie scanned my passport and 
viewed his monitor, he looked perplexed. He turned to the older officer and pointed to 
something on his monitor that he obviously did not understand. The veteran officer 
took a quick look and said, “ADOD” (Advise Department of Defense). 

My computer has been hacked and my phone tapped for years. A recent accidental 
discovery strongly suggests that the hackers and phone tappers are Federal agents 
or foreign agents working with the permission of U. S. intelligence. Here is what 
happened. One day I entered my email Sent File to copy a paragraph that I had 
written to a correspondent about the tiny device having been implanted in a molar 
while living in South America in 1978. I cut and pasted that paragraph and re-sent it. 
Because my computer is monitored and my emails sometimes deleted or changed, I 
went back to the Sent box to see if the message had actually gone out. When I 
opened the sent message, I was astonished to see three words encased in blue-lined 
rectangular boxes: ISRAEL, MIDDLE EAST, and SOUTH AMERICA. 

As a former government employee, let me explain why those three areas were 
highlighted. Intelligence organizations in every country divide their offices into 
geographical areas, including Israel, Middle East, and South America. Copies of my 
email went to those three offices in some intelligence agency in some country. Every 
U. S. law intelligence agency, including the Department of State and other agencies, 
has personnel sections that deal with regional affairs. Whoever monitors my email 
spotted my references to Israel, the Middle East, and South America and marked that 



email for copies to be sent to those regional affairs offices. I suspect that copies not 
only went to U. S. intelligence agencies but also to the Mossad. 


6 


The secret monitors never imagined that I would go back into a previously sent letter 
to cut and paste. Finding the highlighted words was a total accident, but a very 
fortunate one for me, for it told me that somebody monitors my email correspondence 
and that he is not looking for kiddy porn, drug, and money laundering rings but for 
material dealing with political views. After passage of the so-called Patriot Act, 
anybody working with the FBI can justify monitoring a citizen’s email and tapping his 
phones without getting judicial approval. 

Later, to make their flub-up appear to be a computer glitch or a common internet 
action, the same monitors encircled other words on several other letters; however, 
when they saw that I had not fallen for that deception, they quit doing it. In view of the 
fraternal cooperation between the FBI/CIA and the Mossad, the monitor of my emails 
could be an agent of the latter. What I do not know is the location of the person who 
monitors my computer, as computers can be hacked from anywhere in the world, 
including Monroe, Louisiana, where I live, New York City, or Tel Aviv. 

Freedom of expression in the United States seemingly comes at a price. Although I 
have never belonged to the Ku Klux Klan, the Aryan Brotherhood, the Survivalists, or 
any other extremist organization, I have openly and consistently condemned Israel. 

As an American, I thought that I had the right to do so. Apparently I was wrong. One 
can publicly criticize England, France, Mexico, or any other country in the world — 
except Israel. The media, the clergy, and especially politicians on every level carefully 
avoid any negative criticism of Israel. 

That point is supported by Israeli spokeswoman Tzipora Menache, who was reported 
in a February 1, 2009 article as saying, “You know very well, and the stupid 
Americans know equally well, that we [the Israelis] control their government, 
irrespective of who sits in the White House .... We control congress, we control the 
media, we control show biz, and we control everything in America. IN AMERICA YOU 
CAN CRITICIZE GOD, BUT YOU CANT CRITICIZE ISRAEL.” But I do. 

Unfortunately for Americans, the Israeli woman was correct. Today in the United 
States, one hears and reads in the media discussions on abortion, the death penalty, 
the legalization of marijuana, U. S. politicians, religious beliefs and their leaders, sex 
of all descriptions, the Iraq War, autism and every type of mental disorder, and other 
sometimes divisive and intimate topics. I defy the reader to provide a reference to a 
meaningful debate on Israel’s actions and policies in the United States during the last 
fifty years. Moreover, one can verbally express doubt about the divinity of Christ or the 
existence of God or the holiness of the Pope or the sanctity of the Bible but he cannot 
doubt the Zionist version of the WWII European holocaust. 


Having always considered myself a fervently patriotic citizen, I smolder at being made 
a surveillance target and now a target of electronic torture and mind control because 



7 


of my personal and political views. If communication with radical and terrorist groups 
is the only object of my surveillance, that surveillance would have concluded years 
ago that I am not a domestic terrorist or a threat to the United States of America. That 
suggests that I am perceived by either pro-Israel U. S. intelligence or Israeli 
intelligence as a threat to Israel and thus the reason for my surveillance. The aim of 
Israel and its pro-Israel American accomplices is to stifle any opposition at all in the 
United States - and worldwide - to Israel, and American intelligence appears only too 
ready to lend assistance toward that objective. 

A very large number of presidential political appointees are ardently pro-Israel, and 
they even use their diplomatic positions to back Israel’s agenda. The American 
ambassador in an African country in which I served, who happened to be Jewish, told 
newly assigned employees point blank in an initial briefing that a part of our duty was 
to support Israel’s interests. I could hardly believe my ears. His remark was clearly 
intended for me. Knowing my political views, he may have been baiting me to openly 
protest his orders and thus give him reason to send me back to the United States. 

That ambassador, a political appointee, left shortly after I arrived. His replacement 
was a female career diplomat, who was very evenhanded concerning Israel’s 
interests in that county. To her credit, she sent back to the United States an American 
Foreign Service Officer, a Jew married to an Israeli Jewish woman, who used an 
Israeli car and driver to commute to and from work, for his blatant connection to a 
foreign country. I had worked previously with that officer in Washington and actually 
liked that person. He had remarked on one occasion that he had his bags packed for 
an anti-Jewish, holocaust-type movement that was bound to happen in the United 
States, a comment that made me question his loyalty to the United States. 

That Israel views any anti-Zionist views as dangerous and attempts to silence those 
views is obvious. That pro-Israel organizations in the U. S. such as the Jewish 
Defense League (JDL) and the Anti-Defamation League (ADL) perform unlawful acts 
to advance Israel’s agenda is indisputable. That Israel and its U. S. backers have 
reason to want me and others silenced is readily evident. They are masters, however, 
in using misinformation and developing schemes to get others to perform their dirty 
work while they sit and watch several layers removed from the action. They discover 
the target’s vulnerabilities and then farm them out to pro-Israel PACs, Christian 
Fundamentalist Zionists, and plain hirelings, who, without ideals and agendas, simply 
work for the money. 

Such is the control by Israel and its supporters over the U. S. Government that today 
we do not have a U. S. Middle East foreign policy. Instead, our Middle East policy is 
Israel’s Middle East policy. Every serious candidate for U. S. president today must 
extol Israel’s position as the “Middle East’s only democracy,” and our foremost ally. 
Those candidates even have to make a symbolic trip to Israel to pay homage to that 
country and seek the blessing of its prime minister for his/her candidacy before the 
election. 



8 


This paper is not about Israel; nevertheless, I feel compelled to make several 
observations about Israel, as Americans will never see anything critical of Israel in the 
controlled mainline U. S. media: (1) Israel often “creates” its enemies to justify its 
agenda, knowing full well that the United States will back it. Despite the media hype, 
the facts show that Israel has made no genuine effort to make peace with its 
neighbors. On the contrary, through its actions it has ensured continued Arab and 
Moslem hostility. (2) Israel purposefully engenders the belief that it is surrounded by 
hostile forces, as it unites the Western world in its support and opens pocketbooks on 
its behalf. Indeed, the U. S. provides no-strings budget support for Israel that far 
exceeds the entire budgets of most developing countries. 

(3) American politicians and the press tout Israel as one of the United States’ 
staunchest allies; yet, Israel employs spies in the United States. Several spies for 
Israel have been caught in the last few years and incarcerated only later to be 
pardoned by the president or otherwise quietly released later by our government to 
Israel. (4) Israel uses its pro-Israel supporters in the United States, not all Jews by 
any means, to promote its plans for Middle East domination using American 
resources. We have already fought two proxy wars for Israel (the Gulf War and the 
Iraq War) and intervened in Somalia, Sudan, Libya, Yemen, Lebanon, and other 
Middle Eastern and African countries in support of Israel’s foreign policy. In addition, 
we have lost scores of American soldiers when Islamic bombers blew up barracks in 
two Arab countries (Lebanon and Saudi Arabia) and attacked the U.S.S. Cole near 
Yemen because of our unswerving support for Israel. (5) Israel is one of the biggest 
exporters of small arms and assault weapons, many of which end up in the hands of 
gang members on American streets and along the Mexican border. 

Now, substitute the word Venezuela, Iran, Cuba, or North Korea for the word Israel 
and substitute the word Moslem for Jew in the preceding paragraphs, and that 
narrative appears perfectly in keeping with what the controlled U. S. media lead 
Americans to believe. Yet, many Christian Fundamentalists and Jewish supporters of 
Israel, along with the majority of well meaning but thoroughly brainwashed Americans, 
will call the content of what I have just written hate and anti-Semitic propaganda. 

Israel and its pro-Israel allies in the United States have successfully used accusations 
of anti-Semitism to squelch vocal opposition to Israel and its objectives. Today 
Americans are afraid to speak out, fearing the stigma and the consequences of being 
labeled anti-Semitic. Moreover, Israel and its American supporters have bought every 
Congressperson and politician in the United States either materially or politically. I am 
not bothered by people’s opinions of my views. If I were, I would have kept quiet many 
years ago and today I probably would not be a target of electronic and mind control 
activities. Now back to the topic. 


The Discovery 

Although it is now obvious that I had been targeted since the mid-1970’s, I did not 
discover it until December 7, 2005, when my assailants, or handlers, started 
bombarding me with electrical-like jolts, strong vibrations, and other physical torture. 



9 


The first vibrations struck me with such force that I could hardly stand on my feet. I 
gradually learned that the physical electronic effects, although annoying and painful, 
were simply used to “soften” or “sensitize” or “pre-condition” me for the real objective 
- mind control. I later learned that victims are normally targeted for years before they 
finally realize it. Some targets suffer physical attacks for years and visit doctors 
frequently without realizing that their symptoms are not natural. 

Four days after the electronic attack, the handlers, began "talking" to me subliminally 
through my brain. I later discovered that TIs call that communication voice-to-skull, or 
V2K. Of course, only I could hear their talking. At the time that the ESMC hurled me 
into reality, I was sixty-eight years old and in exceptional physical and mental health. 
Although I was initially startled by the “voice-to-brain” communication, I knew full well 
that I was not paranoid-schizophrenic. As an historian and former government 
employee, I understand the value of documentation. Thus, on the very day that the 
electronic effects first pounded me, I started recording a detailed journal in which I 
recount my experiences and my thoughts concerning that topic. The journal today 
comprises six volumes and about a thousand pages of single spaced typescript. 

The voices occurred as I drove in Texas near the Mexican border. When I reached 
Baton Rouge, Louisiana, I sought out a private detective who did a bug sweep on my 
vehicle without finding anything. A few days later, I went to a dentist and requested 
that he take full x-rays of my teeth and mouth. He saw nothing unusual in the x-rays. I 
did not either at the time, as I was looking for a clearly visible, well-defined object; 
however, in May of 2009 I found those same x-rays and looked at them very closely. 

In the roof of my mouth were two tiny specks of what looked to be the same metallic 
substance used for fillings. In my gums was a very slender, light-colored, cylindrical- 
shaped sliver of some object. Those objects are still unidentified. 

I do not yet know how the perpetrators of the electronic and mind control assault 
“hooked” my brain by remote. I have had many inoculations, much dental work, and 
several minor medical procedures performed over the years in various locations. 
However, as the reader will later see, whatever method was used, it had been 
employed in my case by the early 1990’s and probably long before, perhaps even 
dating back to the early- or mid-1970’s. 

Targets and Non-targets 

Shortly after starting my journal, I began researching the topic and communicating 
with many other victims. Almost invariably those victims, like I, had ignored signs of 
electronic stalking and did not realize for a very long time that they had been targeted. 
That is one of the techniques that the stalkers use. The electronic torture and mind 
control activities are “progressive.” Electronic and mind control stalkers begin very 
slowly and gradually increase the intensity of the electronic and mind control effects 
until finally they are too obvious for targets to ignore. Although many of the effects are 
similar, they do vary from target to target. Many of the targets, for example, do not 
hear the voices. Nevertheless, they are there. (More about voices later.) 



10 


Through my subsequent research and communications with victims, I learned that 
stalkers may target any person regardless of race, ethnicity, gender, social and 
economic status, religion, or age. Most of the targets are just plain law-abiding 
citizens who mind their own business. A few others had served time in prison for non- 
violent crimes. ESMC is not peculiar to only the United States. People in countries all 
over the world are reporting electronic and neurological assaults. However, this paper 
deals with only that which occurs in the United States. 

Strangely and perhaps suspiciously, some Americans appear exempt from electronic 
harassment and mind control: (1) Congresspersons and high ranking U. S. 
Government officials, including ambassadors. Lower ranking employees and ex- 
employees of government, however, are often targeted, especially “whistleblowers” 
and those discontented with the status quo. Postal workers very often become 
targets, which very well may explain the shooting sprees and rampages of some of 
those employees. (2) High ranking state-level officials. (3) The clergy, although 
members of Fundamentalist Protestant and Roman Catholic churches often become 
targets. Some of those victims complain that their churches may be involved in their 
harassment. (4) Law enforcement officers. Although I have heard obliquely of police 
officers being electronically assaulted, I have never actually corresponded with or 
read a complaint by a law enforcement target. The exclusion also applies to prison 
authorities, U. S. marshals, Border Patrol, DEA, the entire U. S. intelligence 
community, including the Secret Service, sheriffs, and sheriff’s deputies. (5) CEOs 
and very successful businesspersons. (6) High ranking military officials. Enlisted 
personnel are often targets; however, I have never seen any material about officer- 
level personnel having been targeted. (7) The medical community. (8) The wealthy. I 
have never read anything about a millionaire having been victimized by ESMC. Most 
of the targets are middle-class workers, small business owners, retirees, and 
sometimes financially- and socially-marginal persons. (9) Judges and lawyers. The 
perpetrators know that judges and lawyers possess credibility and also know the laws 
and would thus be able to leverage law enforcement into action. (10) Persons with 
expertise in radio and electronics, who could perhaps eventually figure out what 
device is being used and how. 

There are two logical and plausible reasons why most of those particular people are 
not targeted: (1 ) They are a part of the conspiracy, either directly or indirectly, and 
thus protected. (2) The perpetrators know that those targeted groups would possess 
the intellectual credibility and the power to command investigations of their attacks. 

Foreign countries have attempted to influence U. S. domestic and foreign policy for 
decades through political action committees (PACs). They still do that. However, now 
several foreign countries have the capability to perform electronic stalking and mind 
control activities for that purpose. Logically, those foreign countries will target the 
following Americans: (1) the sitting president and possible candidates for the 
presidency; (2) key members of Congress; (3) top U. S. military brass; (4) CEOs of 
large companies, particularly those firms with defense contracts; (5) selected clergy; 



11 


(6) writers, producers, and media personnel; and (7) other influential persons. Can 
there be any doubt, then, that our CIA/FBI and other intelligence services do not know 
about electronic stalking and mind control and protect those probable targets, 
especially those seen in Numbers 1-3, from that activity? 

Theories of Methods Used in ESMC 

It is indisputable that electronic and mind control assault operates by remote. That 
means that some object makes contact with the human body over a distance through 
the air. Thus, whatever method is used must operate along some type of frequency. 
Almost anything today can be controlled by remote using particular radio frequencies: 
satellites; rocket ships; less sophisticated free flying machines like military spy drones; 
garage doors, and indeed almost any other motorized equipment. To allow those 
frequencies to contact it, the human body must carry in or on it some object, 
substance, or characteristic that will attract those frequencies. Evidence of that is 
seen in a target’s being vibrated while in the presence of other people without the 
others feeling it. In my case, certain voice inflections and tones of narrators on TV 
also cause jolts in my body; those sounds could only come from electromagnetic 
waves or frequencies. 

Satellites now possess amazing capabilities, all performed by remote, and they may 
very well be utilized in electronic assaults and mind control. In a 2003 article called 
Shocking Menace of Satellite Sun/eillance, John Fleming wrote about the use of 
satellites in ESMC assault. Discussing the realities of satellite-driven ESMC, Fleming 
said: “The victim’s movements will be known, his conversations heard, his thoughts 
picked clean, and his whole life subjected to bogus moralizing, should his tormentor 
diabolically use the information gained. A sadist could harass his target with sound 
bites, or audio messages, directly broadcast into his room; with physical assault with a 
laser; with subliminal audio messages that disturb his sleep or manipulate persons 
around him into saying something that emotionally distresses him . . . .” The GPS 
almost certainly figures somehow in the electronic assault and mind control activities. 
Programs such as Google Earth pinpoint houses and other objects on maps. Users 
can zoom in on those structures and focus on them. At any rate, that a victim can be 
targeted regardless of his location and movement argues that a satellite must be 
involved. 

This paper does not explore in depth the methods used to zero in on a person’s mind. 
There are many schools of thought on that subject. Here are some of them. 

One popular theory states that victims are implanted with microchips. Scores of 
patents dealing with microchips in the human body have indeed been filed, many of 
which, in the wrong hands, could be utilized for electronic abuse. I have read of only 
one person who supposedly located microchips in his body, had them surgically 
removed, and then had them identified. My efforts to contact that individual failed. In 
my opinion, his claims have not been authenticated. We know, however, that many 



12 


forms of microchips have been developed for the human body, most of them capable 
of being controlled by remote. 

If indeed microchips turn out to be instrumental in a target’s electronic assault and 
mind control, it directly implicates the medical profession. Those microchips had to 
have been implanted at some point by a dentist, a doctor, an anesthetist, a nurse, or 
somebody else in that field. Is that perhaps why a target experiences so much 
difficulty in getting a doctor’s order for a CT Scan or an MRI? Is that why surgeons are 
so reluctant to remove foreign objects located by MRIs and CT Scans? 

Another theory believes that voices can be recorded, transferred to a computer, and 
the computer then used to lock onto that person’s brain. Experiments show that that 
can indeed be done. However, for a computer to connect with the brain requires some 
type of catalyst. One day when the handlers were vibrating me mercilessly, I tensed 
my throat, and the vibrations stopped. That caused me to remember an incident that 
occurred when I served in Africa in the 1980’s. One day while working in my office, 
the secretary from the embassy political section, the office that serves as a front for 
our CIA agents, called me to ask some question that anyone could have answered. I 
hardly knew the caller; thus, I instantly realized that the real purpose of her call was to 
record my voice. However, I believed that it was probably for security purposes in 
case of kidnap or being held hostage at some point. That our intelligence community 
was recording voices in the 1980’s makes me believe that there may be some validity 
to the theory that perpetrators of ESMC may be able to “hook” our brains by zeroing in 
on our voices. Voices give off distinct vibrations that are as peculiar to a person as his 
fingerprints and DNA. 

Some evidence also suggests that targets’ minds can be “hooked” if the handlers 
know the targets’ DNA. If that is true, targets would not necessarily have to have a 
microchip or other object or substance in his body to be hooked. There may be some 
remote device that with the aid of the GPS will locate a person and “hook” him using 
his DNA. If DNA can be utilized, society is in deep trouble, for obtaining DNA samples 
of people is a very simple matter. Even touching a glass or a can will leave useable 
traces of DNA. 

Still another theory talks about small devices (nano-microchips) made so small that 
they can fit between molecules of water and other liquids and be injected into the 
body in shots and inoculations. Patents taken out by scientists describe that very 
procedure. Other theories include wiring in the ear that connects with the brain, pins 
that penetrate the skull, and some type of substance ingested into the body through 
normal food and drink. 

There is also evidence that even human breath or breathing somehow figures in 
electronic torture and mind control. Yet, we do not know whether it has any 
connection with “hooking” a target’s brain. I tend to believe that the breath, or perhaps 
the movement caused by breathing, enables or aids the handlers’ device, for I much 



13 


later found out that when I hold my breath for a few seconds, the vibrations 
temporarily cease. 

In addition, MRI machines have been successfully combined with computers and 
used by remote along radio frequencies to move digits and limbs, detect emotions, 
and “detect lying, racism, and even identify which image a person is looking at, 
suggesting [that] one could visualize scenes from a person’s dreams or 
memory” (Hospital Soup.com, June 10, 2008). The uses of a device such as that are 
endless if used on the brain’s wave lengths or frequencies. 

Similarly, neurotransmitters can be used by remote to communicate with brain cells 
through electrical impulses. That device can tap into the brain’s functions that cause 
body movement, thought, feelings (emotions), and communication. It could probably 
also influence the thalamus, or the inner part of the brain, which regulates body 
temperature and controls urges such as eating, sleeping, and sexual behavior. 

Laser guns may play a role in ESMC. A CNN news program on February 23, 2009, 
reported that 148 incidents of lasers aimed at airplanes had already been reported 
since the beginning of the year. In the last incident, the laser was green in color and 
about the size of a pencil. If a laser beam can be focused to such a fine point over 
several miles of distance, imagine what it could do when trained on an individual or an 
object over a period of time. 

Mounting evidence suggests that a substance or an object can also be introduced 
sexually into a target’s body to “hook” his or her brain. Several of my correspondents 
mention that their ESMC began after having had an intimate relationship with 
somebody. Those relationships may have been set-ups. Spies and undercover agents 
often use sex to entrap individuals. Some such object or substance could possibly be 
introduced into targets vaginally, orally, or anally through sexual contact. 

All that said, pick a theory. In truth, we do not yet actually know how high-tech 
assailants capture a victim’s mind; neither do we know what instruments are used in 
the process. Both are highly guarded secrets shrouded in deception. In fact, there 
may be several methods of “hooking” the target. 

Whatever device is used to “hook” the brain, it has the capability of using that system 
on diverse targets in a variety of circumstances in all types of locations. A computer is 
used along with the device, and it has an amazing range of capabilities. We shall later 
see some of those capabilities and the effects they have on the human body and 
mind. Whatever device and method that are used to “hook” the brains of the targets, I 
suspect that when we discover the truth - and we will - the system will probably turn 
out to be far less sophisticated that we imagined, perhaps a laser gun used with the 
GPS along a certain frequency or something similar. And I also suspect that to train 
that device on a particular target does indeed require a foreign object or substance in 
or on that person’s body. 



14 


In my case, most of the symptoms occur on and around my head, which leads me to 
believe that if there is indeed an object in my body, probably located in that region. 
Here are some of the effects on my head: tinnitus (ringing in the ears); tops of ears 
oozing a colorless fluid; sensation of bubbles popping in mouth; salivating from the 
mouth at any time; pin pricks on the eyes and a loss of vision; the top of the nose 
coating over with a thick crust; tingling on the skin (as a result a brown spot has 
appeared on the right outside nostril and a sore-type depression, on the right side of 
my chin); clicking on my head and in my left ear; frequent, long-lasting, pin-like prick 
on the back of my neck; the sensation of flies crawling on my face; a psoriasis-like 
area on my cheek near the left eye; a very sharp sensation on or in several teeth (as if 
a dentist drill had hit a nerve); a heavy pounding, throbbing in the back of my head; an 
unnaturally intense itching in the corners of my eyes and on my eyelids; pin-like pricks 
in the depths of my ears that cause me to shudder violently; air that pushes my lips 
out as if I were snoring through my mouth; scratching of the throat, which causes 
either sneezing or coughing; a tingling inside my nostril that induces sneezing; 
blockage in my esophagus that makes it difficult to swallow; constant itching inside my 
nostrils that makes me want to “pick” my nose; and of course the voices that occur in 
my brain or ears. (More about symptoms later.) 

Deception 

The attackers, or handlers, use deception to reinforce mind control. Many of the 
physical symptoms that handlers cause in targets are merely deceptions. When a 
victim is struck with ESMC, he first believes that the objective is to torture him 
physically. Although the handlers gleefully apply the torture techniques, their real 
objective is mind control. Through voice-to-skull (V2K) contact, the handlers can 
manipulate the target without the target being aware of it. 

In aiming their voices to the targets’ ears, the handlers will use a local accent. 
However, local handlers will probably not be highly trained in deception, which means 
that the handlers are probably not local. I suspect that the handlers are trained 
employees of national intelligence, the military, and perhaps companies involved in 
defense, universities and private labs that provide technology to our government or 
foreign governments - fulltime and occupational handlers. It is possible that wealthy 
individuals, religious groups, and other organizations could have been provided or 
somehow gotten access to that secret technology by now. If that is a possibility, local 
handlers could have received training. Nevertheless, even if local handlers are used, 
they have to be tied in to a central super computer. Only the government would 
probably own such computers. 

Quite a few correspondents who have been targeted and who communicated 
telepathically with the handler perverts stated that the handlers sometimes attempted 
to convince them to cooperate with them. In several cases, the handlers have tried to 
convert the targets into good “Christians,” which, considering the cruelty and 
unlawfulness of those “Christians,” is a real joke. In my case, the handlers often show 
me holographic pictures of a man in robes who is generally believed by Christians to 



15 


be Jesus and tell me that I am going to hell. Again, that is total deception. I taunt them 
that the picture was not autographed. 

A whistleblower who worked with the U. S. National Security Agency under a defense 
contract wrote in an internet article: . . the subject is unknowingly given hypnosis 

while the subject is completely awake and is tortured and punished with this hypnosis 
into a predetermined behavior by the National Security Agency; . . . the behavior is 
usually extremely religious, is called ‘reborn’ by the church, with the subject's life-long 
goal of ‘a personal relationship with Jesus Christ.’” The NSA uses this technology 
[electronic torture and mind control] to resocialize (brainwash) the US civilian . . . 
population.” 

That aim may be the link between the government and Fundamentalist preachers. It is 
worthwhile noting that many Christian churches today receive government grants, an 
act once believed to violate the principle of separation of church and state, which 
began in the 1970’s. When I ask TIs to describe their symptoms, when those 
symptoms began, and their general physical environment, they very often mention 
that a Fundamentalist minister lives next door, across the street, or very nearby. A law 
enforcement officer will also often live very close. 

I can tell the reader that the handlers themselves are most definitely NOT traditional 
Christians and could not possibly be truly religious in any fashion. Yet, they 
deceptively try to give their evil practices a fagade of morality and piety. Handlers will 
also try to convince the targets that they are of particular ethnic groups, e.g., Latinos, 
East Indians, Afro-Americans. They reinforce that deception through “wrong number” 
telephone calls posing as persons of those ethnic groups. I continually get “wrong 
number” calls from black- and Latino-sounding people from various area codes in the 
United States. 

Even the emphasis on sex is deceptive. Handlers find out a target’s sexual thoughts 
and preferences, and they fully exploit that knowledge. However, although they are 
born voyeurs and get much pleasure out of harassing a target with induced sexual 
thoughts and images, sex is not their objective. They know that their knowledge of a 
target’s sexual thoughts shatters a target’s self-esteem and well being, and they use it 
as a tool to induce anxiety, confusion, fright, frustration, and humiliation. 

The handlers also deceive through playing “good cop-bad cop.” My handlers almost 
always deride my work efforts and methods in their subliminal talking as I carry out 
home improvement projects. They taunt and belittle me as I work. Then, after a few 
minutes of blustering and disparaging the activity, one of the perverts will make a very 
complimentary remark about some aspect of the work. I am supposed to warm up to 
that individual. To an educated target, their psychology is juvenile. I call it “pre-nursery 
school psychology.” 


Impostors 



16 


Impostors flood the internet with misinformation on ESMC to throw victims and 
researchers off track. Every intelligence agency has an operational section whose aim 
is to spread false propaganda. The propaganda machine spreads misinformation over 
the internet through several types of “plants” in the media, for example 

(1 ) Webmaster “plants” working for the perpetrators use the internet to spread 
erroneous and misleading information. Those liars pretend that they were abducted 
by aliens, tormented by people who look like lizards, and subjected to rituals 
performed by Reptilians. They link ESMC with UFOs. One of the favorite lies is that a 
group of families called the Illuminati seeks to control the world. More recently, the 
misinformation agents have convinced many targets that they come from a particular 
genetic strain or blood line and were thus targeted before or from birth. Many of the 
TIs who actually believe those things are very well meaning and have been convinced 
of those inaccurate concepts through voice-to-brain emissions. That is exactly why we 
call that activity “mind control.” 

(2) Internet blogger “plants” strew erroneous material in their online blogs. 

(3) Tl “plants” in various internet forums write pedantic emails, oftentimes belittling 
authentic TIs and refer other viewers to lies disseminated in bogus web sites and 
other locations. Some of those “plants” relate convincing stories; however, eventually 
they trip over their many lies and astute TIs can pick them out of the crowd. 

(4) Author “plants” also produce misinformation published in on-line articles, in 
magazines, and even in books about electronic assault and mind control. In addition 
to the intentional and purposeful impostors, jokesters often write garbage-filled letters 
to real TIs and post erroneous material on web sites. 

Now, not all of the information spread on the internet, in articles and books, and by 
internet correspondents is false by any means. Even many of the people who spread 
misinformation and disinformation are very sincere. I do not pretend to be expert in 
determining which information is false and which is true; however, I have learned that 
much of it is utter bullshit. Electronic assault and mind control itself is incredible 
enough without being compounded by deliberate lies disseminated by the ESMC 
perpetrators. 

Let me be perfectly clear. The perpetrators of mind control are NOT aliens from outer 
space. NOT members of the so-called Illuminati. NOT men who can change to 
reptiles and lizards and other paranormal shapes. NOT ritualistic sex lords seeking 
sex slaves. NOT men seeking to wipe out particular blood lines and genetic groups. 
NOT members of the Masonic Order although some of them may be Masons. And 
probably NOT seekers of a New World Order. Targets who believe those deceptions 
have been successfully manipulated by the perpetrators. Know that electronic and 
mind control assault is performed by evil-minded, cruel, degenerate beings working 
either with the government, with the knowledge of the government, or under the 
protection of the government. In some cases, the government may even be a foreign 



17 


country conducting assaults by remote on American citizens and residents with the 
collaboration of domestic intelligence. 

The power brokers behind electronic torture and mind control fear the targets’ 
networking over the internet. Many bloggers and persons with web sites who 
encourage an interchange of ideas about ESMC and who are true TIs have been 
subjected to internet intimidation by having their blogs and web sites deleted or 
otherwise compromised. Some have had to change the names of their sites several 
times because of that interference. Keep in mind, however, that some of those same 
people may actually be accomplices pretending to be harassed. More possible 
deception. 


Capabilities of Perpetrators of ESMC 

The only fact that we know for certain about electronic assault and mind control is the 
symptoms, or how ESMC manifests itself to the victim. Targeted individuals are well 
aware of the capabilities of the assailants, but for those readers who may be reading 
about electronic stalking and mind control for the first time, here are some of them. 

(1) Monitor movements. They not only know one’s vehicular movements but they can 
also view him and follow his movements on his property and even inside his house. 
Once they “hook” the target with their equipment, they have ready access to the him 
at all times. Their torture follows the target wherever he goes, even to other states 
and abroad. 

Cell phones may play a role in monitoring a target’s movements. Many TIs trace the 
origin of their electronic torture and mind control to the early 2000’s, when cell phone 
usage was becoming increasingly more popular. Cell phones have to be used in the 
case of gang stalking, which goes right along with ESMC. In fact, the stalkers could 
not coordinate their harassment against targets without the use of cell phones or 
some type of walkie-talkie. Cellular phones may even somehow be used with the 
device that renders the electronics effects on victims. It is known that cell phones 
carried on one’s person near credit cards can cause those cards to malfunction and 
wear out quickly. Credit cards are one of the hundreds of items that operate through 
the RFID (radio frequency identification). 

The handlers appear to be able to map out your house or apartment. They probably 
first locate your residence, using Google Earth or some other program of that type, 
and then learn the configuration of the structure with some kind of infrared-type 
device. Once they have the layout of your house or apartment, they seem to divide it 
into grids, probably with the help of an architectural -type computer program. Then, 
they slowly zoom in on various locations where you habitually sit, stand, or lie and 
program those locations on their device. In my case, they first located the chair in the 
living room where I sit, then the lavatory and commode in the bathroom where I stand. 
Finally, they had programmed every area of the house, and they were able to jolt me 
and vibrate me in any location inside my house. 



18 


(2) Hear and record one’s conversations along with those with whom one talks. This 
can be done even in a moving vehicle or while on foot in a rural area. The harassers 
occasionally record and play back to the victim excerpts of some of those 
conversations in his brain. The handlers can also record a person’s voice and then 
simulate that voice. 

(3) See through the victim’s eyes. One’s eyes are controlled by his brain; thus, by 
controlling the victim’s brain, the handlers can also see whatever the victim sees. Not 
only that but they can also see what he thinks. Although a victim is led to believe that 
the handlers can accomplish this, it may be another example of deception through 
psychological trickery. For example, the handlers often comment on what I am 
watching on TV or what I am doing in the house. They may know that because of my 
brain’s processes, as the brain is in constant motion as I watch TV and do chores 
around the house. Someday we shall know. 

(4) View the victim’s body whether it is clothed or not and zoom in on any part or 
organ of the body, even in the darkness. EKG, CT scans, and MRIs can be performed 
by remote. The handlers probably use the GPS with directed sound to see and torture 
the target’s body by remote. NASA has long used similar telescopic instruments for 
carrying out delicate space operations. Although the handlers can target specific 
areas both on and in the body, this may be accomplished, either partially or wholly, 
through communication with the targets’ brains. 

(5) Inject holographic pictures or images into a victim’s thoughts. In my case, the 
handlers have shown: my son drowning; pictures of what Christians believe to be 
images of Jesus; and pictures of family members and friends, sometimes in 
suggestive poses, and countless numbers of unknown individuals in induced dreams 
and thoughts. When I pray for my grandchildren, a girl and a boy, the perverted 
handlers will sometimes show my granddaughter’s school uniform dress flying 
upward. Sometimes the pervs show me old photos in black and white, further 
evidence that the handlers can communicate through my eyes. Their computer directs 
the targets’ brains to view all people and all situations in sexual and negative 
contexts. Again, this is pure mind control. 

6) Apply a variety of torture techniques to the body. Many of those effects may 
perhaps be done through the use of silent directed sound and various PC software 
used over the voice-to-brain communication. Others may be psychological or aided by 
psychological suggestions through the psychopaths’ subliminal talking and whispering 
into the target’s brain. Those effects include 

-- sensation of pin pricks in the eyes, shoulders, face, feet, elbows, and other 
areas. The pin prick can be instantaneous or can be prolonged. In my case, the 
handlers have long caused an enduring pin prick on the rear of my neck. At first I 
thought that the sensation was an irritation on the neck caused by shirt labels; 
however, when it kept hurting in the absence of labels, I knew that it was only one 
of the perverts’ bag of tricks. In addition, the sensation was not in the same 



19 


location as the shirt labels. They can also cause the entire lower legs to feel like 
they are being struck by pins. In recent months, they have pin pricked the depths 
of my auditory canal in my right ear, causing me to shiver violently. They have also 
frequently pricked underneath the toenail on my right foot, causing the toenail to 
recede for a quarter of an inch between it and the skin, much like laser is used for 
ingrown toenails. 

restless legs. A sensation begins in the small of the back and extends into the 
extremities, causing the “restless legs” syndrome. I can feel that sensation coming 
on as the handlers apply their vibrations to my body. Sometimes when that 
happens, the legs will jerk involuntarily. 

electrical jolts. These affect the entire body and feel much like the shock that one 
gets from touching a low voltage electrical fence. 

tremors, or vibrations. These can affect the whole body or be focused on specific 
parts of the body. They can range from very mild to violent. (I believe that the jolts 
and vibrations may partially be pre-hypnotic suggestions causing the target to 
think that he feels jolts and vibrations whenever the handlers whisper the code 
word. In other words, those physical effects may instead be psychological effects 
resulting in physical reactions. I have asked other people to touch my legs and 
body when they were vibrating, and they felt nothing.) The vibrations can envelop 
a large area, e.g., a lawn, including the house, or they can narrow down to a very 
small area, e.g., a target’s stomach or his nose. 

zapping in/on the head. These sound much like sparks from a welder’s torch or 
like children’s sparklers used as fireworks on holidays. 

clicking in the left ear. (In my case, it is always in the left ear, never in the right 
one.) 

severe cramping, mainly in the calves of the legs, 
numbness in the limbs from the base of the spinal column to the toes, 
coughing (I can feel an unnatural scratching in the inside of my throat), and 
sneezing (likewise, I can feel an artificial tickling in the inside of my nostrils), 
induced erections, by vibrating very lightly the inside of the urethra and the groin. 
Those erections usually occur while the handlers whisper the names of friends and 
relatives, very obviously attempting to cause the target to associate the sexual 
sensation with those people. 

stomach aches and pains, indigestion, nausea, and dizziness, 
sodomizing and virtual rape, using some unknown force to probe the anal cavity 
and the vagina (perhaps directed sound waves, which cause a strong vibration 
and can focus on a particular very small area). 

lethargy and listlessness. I suspect that many people suffering from Chronic 
Fatigue Syndrome are actually victims of ESMC. 

tinnitus. I had never suffered from tinnitus before the electronic stalking began. It 
hit me the day the stalking became overt, and I have had that condition ever since 
then. The tone of the ear ringing changes often in a very notable manner, 
sometimes reaching a very high pitch. 

inability to urinate or frequent urination. I had two prostate procedures in 2001, 
although the prostate was not enlarged, because I had the urge to urinate but 
could not do so. Now I know that it was the work of the perverts who use the 



20 


ESMC techniques, for since the handlers became overt in 2005, they have 
continued making the bladder often seem full. Now I can hear them whispering, 
“Don’t piss.” 

constipation. Likewise, I often used to have a problem defecating. Since I have 
developed an ability to “hear” the handlers’ whispers, I hear them saying, “Don’t 
shit.” The brain learns over a period of time to react to their commands. However, 
knowing now what causes the constipation, I am no longer affected by it. 
frequent defecation. The handlers constantly probe my anal cavity and whisper for 
me to “go shit.” According to other victims, this is a very common symptom. 

Making victims defecate often is psychological as well as physical, as it humiliates 
victims and keeps them from leaving home. That particular effect, however, has 
not adversely affected me. I still control my bowel movements, 
sleep deprivation. All of this leads to sleep deprivation, which then becomes a 
symptom itself. This is designed to weaken the victim’s body as well as his mind 
and cause him to have motor, household, and other accidents. In addition, it 
makes the victim more vulnerable to mind control. Conversely, the handlers’ 
device can also make targets incredibly sleepy and actually cause his eyes to 
close involuntarily. There also appears to be a particular form of vibration that will 
“wire” the target to keep him awake at night, 
the sensation of crawling insects on the face and neck. 

intense itching. This can be any place on the body. They often will make it seem 
like a mosquito bite or a fire ant bite. The itching is normally on the hands or the 
feet. 

twitching of the fingers. The perverts not only want to annoy you but also 
convince you that you are developing Parkinson’s disease. 

partial loss of sight. The handlers do something to the eyes that make them feel as 
if a grain of sand is underneath the eyelid. They also cause pin pricks in the eyes. I 
have lost much sight in my left eye as a result. I do not wear glasses to read or to 
drive. Until a few months ago, I could read the TV captions clearly. Now I have to 
be very close to the TV set to see the captions and I often have double vision and 
blurred vision, especially in the left eye. In addition, the lips and mouths of 
speakers on TV are not in sync with their words. I also recently discovered while 
watching Wheel of Fortune on TV that the movements of objects on TV are 
likewise not in sync. When the participants in that program spun the wheel, the 
result on my TV (or in my vision) was about two clicks of the Wheel of Fortune off 
what they should have been. 

throbbing in the head. This has something to do with “mining” the brain or it is part 
of the psychological conditioning to make the target believe that he must reveal his 
thoughts. 

aches and pains in various parts of the body. I am very physically active; thus, the 
handlers attempt to cripple my knees and my right arm and hand (I am right 
handed) to keep me from being able to work. They can also cause arthritic-type 
pain in the hands, pains in the lower back, and extreme pain in the legs by striking 
the sciatic nerve. 

salivation. The pervs’ device can cause me to salivate at night while I sleep as well 



21 


as during the day when I am active. For no reason, spittle will sometimes seep 
from the corner of my mouth. 

— tingling vibration focused on the outside of the right side of the nostril (it can, of 
course, focus on any location). As a result of the vibrations (or perhaps lasering) 
on that area, a small brown bump has appeared at that location. That bump 
remains very sensitive and often runs and forms a scab. 

— involuntary physical movements. For example, when I type my emails and 
computer documents, the pervs’ software, which constantly pummels my brain, 
causes me to reverse certain consonants and vowels, slowing down considerably 
my typing speed. Other targets have suffered serious falls, when the devices 
caused their knees to buckle. The handlers’ device can also cause the arms and 
legs to flail and jerk involuntarily. I have awoken while sleeping when one of my 
arms flailed into the head board. 

-- heart flutters and irregular palpitations. In particular, the perverts cause the heart 
to beat at a far greater than normal rate, or at least they lend the perception that it 
is beating rapidly through psychological or perhaps post-hypnotic suggestions. 

The handlers want the target to believe that his heart is overworking and that he 
may suffer a heart attack, stroke, or chronic heart problems. 

-- pressure on the bladder, causing the victim to want to urinate very often. Because 
of that sensation, I underwent two painful and costly prostate procedures with a 
urologist before I knew the real cause of the problem. The pervs still apply 
pressure on the bladder; however, now that I know that it is their evil work, it does 
not bother me. 

— sores in various areas. The perverts continually vibrate (or laser) the outside of my 
right nostril, which remains continually sensitive. That area scabs over, loses its 
scab, and then scabs over again. A spot has also developed on my chin, where I 
often feel the tingling of their vibrations (or lasering). 

-- high and sudden temperature rises in the body. Those may be partially 
psychologically induced. 

The physical symptoms listed above are some of those that have occurred in my 
case. Other targeted individuals may have experienced other symptoms, perhaps in 
addition to those I have listed. Just as the groups of handlers differ, so do the 
symptoms that those handlers cause. 

The electronic jolts and vibrations also affect domesticated animals. My handlers can 
beam their frequencies (or whatever) in broad waves that cover very wide areas, 
including my yard and the adjoining pasture. My dog, which is an outside pet, is much 
affected by the electronic assault methods despite her being in excellent health and 
getting regular checkups by the veterinarian. She often trembles violently and appears 
frightened. At times, she pants heavily, gulping for air, and almost collapses. She very 
often shakes her head as if she is trying to get something out of or off her head. I’ve 
taken her to the vet twice for that symptom, and he diagnosed her both times with an 
ear infection and prescribed her medicine. Despite that, after almost three years, she 
still shakes her head. My cat, on the other hand, does not seem to be affected by the 
electronic effects. Gender could not be a factor, as they are both spayed females. 



22 


Earlier Tell-Tale Symptoms 

In the 1990’s, I experienced several strange symptoms that I now know were the 
handlers’ work. Although at the time I thought that they were odd, I did not connect 
them to any evil source. 

— The muscles in the calves of my legs pulsed unnaturally. That symptom continues 
to this day. There is absolutely no physical explanation for that strange occurrence. 
There seems to be no particular pattern to the pulsing. Moreover, weather and other 
conditions do not seem to affect the pulsations. Some days there is much less 
noticeable pulsation than other days. I believe that the strange pulsing has something 
to do with the electromagnetic force or frequencies of whatever device is used by the 
handlers to connect with my mind. 

— The tops of both ears began to exude a colorless fluid that became crusty. 

Likewise, there is no physical explanation for that condition, which still continues 
whether I use sun screen or not. Other victims have mentioned the fluid coming from 
the tops of their ears. Also, the top of my nose forms a crust. I remove it with a soapy 
bath cloth one day and the next day it reappears. Sun screen does not prevent its 
doing that. I do not have particularly sensitive skin. 

-- 1 also experienced the sensation of something crawling on my skin or underneath 
my skin, normally on my face. Unable to sleep well at night, I sought out a 
dermatologist. The doctor called that condition dermatitis and told me that it had no 
known cure. Strangely, he said that he also had dermatitis. That condition gradually 
went away and did not return until the electronic effects and mind control activities 
became obvious in December of 2005! I now know that the “dermatitis” in the 
mid-1990’s was the work of the handlers, probably whispering to my brain that I felt 
insects crawling on my face. 

- I became weak and lethargic for no apparent reason. That malady is often called 
chronic fatigue syndrome. Such was my lack of energy that oftentimes my son would 
have to help me up from my chair. Even then, I was unsteady on my feet. I was still in 
my fifties. Despite those odd conditions, I failed to see anything sinister in them. Over 
time, I regained my strength, and today I am again exceptionally fit. I later learned that 
the handlers’ device can cause chronic fatigue. 

- I also often had “restless legs” at night when I retired. That symptom is a favorite 
with the handlers, and it appears to have some kind of relationship to the pin pricks 
and vibrations. It first begins at the small of the back and then continues down the leg, 
usually the right one, to the bottom of my foot. 

At first, targets normally ascribe their ailments and physical problems to simply “bad 
luck,” lack of exercise, genetics, a poor diet, or advancing age. It literally takes years 
for most targets to realize that their symptoms are induced by remote by people who 



23 


want to harm them. Once the target does become aware that the effects are 
unnatural, he has absolutely no defense against the torture, and his frustration, anger, 
and anxiety mount. Nobody believes him. Law enforcement will not investigate his 
claims. When that scenario develops, the handlers have achieved what they wanted 
and anticipated. Many targets die without ever knowing that they have been targeted. 

(7) Cause the target financial problems. Keep in mind that most targets live on fixed 
incomes and most of them have to live frugally. Yet, the handlers employ a bag of 
tricks designed to drain the target financially by 

- Making the target spend thousands of dollars on remedies and gadgets that 
supposedly neutralize or ameliorate the effects of ESMC and causing him to hire 
detectives to investigate the ESMC. 

-- Causing the target to make mathematical errors on his taxes and other documents 
that result in substantial losses. 

- Affecting the target’s judgment that ends in his making faulty and costly decisions. 
-- Destroying expensive household and other items, making targets have to replace 

them. In my case, they have ruined two printers, two blenders, and other 
household items. Their device, however, can only affect machines that have small 
motors or batteries. My coffee makers, which have no motor, are not affected. 

- Distracting the target so that he forgets to pay bills on time, leading to his paying 
penalties. 

- Creating problems with the electrical system and mechanical devices, especially 
computers and printers, that make targets have to hire technicians to repair. I have 
had to hire PC technicians several times at from $75 to $140 a visit. 

- Urging the targets through their voice-to-brain whispers to buy expensive needless 
items. 

-- Fomenting personal and other problems that require that targets hire lawyers. A Tl 
correspondent wrote about her taking videos of neighbors overtly harassing her 
and then being arrested for that action. She had to hire a lawyer to get out of jail 
and is now awaiting trial. Of course, nothing happened to the harassers. Moreover, 
now that law abiding citizen has an arrest record that will follow her to the grave. 

-- Sending targets to hospital emergency rooms due to physical problems they cause 
with their devices. One Tl correspondent rushed to the ER on at least three 
occasions when the handlers caused her throat to constrict, keeping her from 
breathing. 

- Ruining the targets’ credit. The manipulators and their accomplices will steal credit 
card and other statements from the targets’ mail boxes or “lose” them in the postal 
system, causing targets to pay late fees; by whispering into the targets’ brains, 
make them forget to pay bills; and interfere with the targets online payments to 
cause them bill payment problems. 

- Robbing targets of their time by harassing them continually with electronic assault 
and mind control, thus keeping them from tending to their business affairs. Very 
often targets lose their jobs because of the ESMC distractions in their lives. I have 
spent countless hours taking notes, recording them in my journal, corresponding 
with other TIs, researching on the internet, and trying objects and ways to 



24 


neutralize the ESMC effects, time that I could have spent on home improvement 
projects and other useful activities. I am a very able genealogical researcher, and I 
used to spend hours a day at that pastime. Now I very seldom do family research 
because of the many distractions that affect my concentration. 

Causing targets financial ruin is one of the aims of the handlers. Many of the targets 
with whom I have corresponded have depleted their savings and have gone into 
bankruptcy because of the perverts. Others have become virtually street people. The 
handlers set out to break targets financially, and they often do. 

(8) Knock out and interfere with the function of battery-operated or electrical 
household items. In my case, the handlers have changed radio stations, caused 
halogen flashlights to blink and go out, caused the tiny lights in a fingerprint reader 
used for PC security to quiver, caused interference in TV programs, burned out 
electrical wall outlets, caused microwaves not to function, burned out watch batteries 
while the watch was on my wrist, and changed the functions of certain keys on the 
keyboard of the computer - all by remote. They have ruined four computer printers, 
two Weedeaters, two blenders, and other appliances and motor-driven objects. They 
have also burned out the batteries in my smoke detectors, flashlights, and other 
objects that use batteries. Their device can even cause the ink in pens to congeal or 
dry up so that the pens will not write. Once, as I stood watching, they caused the 
loose cap of a gallon jug of milk to flap upward several times. I ridiculed them that 
they weren’t able to flip the cap completely off. All of this suggests that the pervs use 
directed silent sound beamed in by a radio frequency and guided by the GPS. 
However, their device cannot disarm any appliance that is not battery-operated or 
motorized, for example, a coffee maker, which operates through only a heated coil. 

(9) Manipulate the target’s computer and telephones. By hacking the computer and 
tapping the phones, the handlers are able to interfere with the target’s communication 
system and thus harm his relationships with family members and friends. One of the 
chief aims of the handlers is to totally isolate the target from society. The handlers can 
operate on the highest levels of telecommunications providers. For example, when my 
handlers want to keep me from opening a web page, they can cause a pop-up saying 
“Internet Explorer cannot display the webpage.” My handlers also re-direct my 
telephone calls and interject disturbances into telephone conversations that only I can 
hear. The handlers will also send duplicate emails, change words in your emails, and 
resend emails days after you send the original to your correspondents to make you 
appear crazy. 

I live in a rural area, where it is difficult to obtain DSL. When I found out that 
Hughesnet offered DSL in rural settings, I subscribed to their service, and the fee was 
deducted directly from my bank account. I was very pleased to be able to 
communicate with other TIs using high speed internet. The handlers, however, set out 
to remove that advantage. They began using pop-ups with the Hughesnet logo telling 
me that there were problems with my accounts. At the time, I believed that the pop- 
ups were from Hughesnet. I became so annoyed by what I considered was 



25 


Hughesnet’s lack of accounting efficiency that I canceled my service. Only later did I 
learn that it was handler deception that caused that action. Today, I am back to using 
the much slower dial-up internet. Just what the handlers wanted. 

Interference with the target’s PC and telephone is designed to isolate the target (mind 
control) and to find out who his contacts are. Information gained about the target by 
tapping his phones and hacking his computer is minimal. The handlers ALREADY 
know the target’s most intimate thoughts, actions, and his life history. 

(10) Discredit the target by making him appear insane or demented. They will also 
spread rumors about the target designed to isolate him from neighbors. Those rumors 
will usually suggest that the target is a drug pusher or user, a child molester (one of 
their favorites), a wife-beater, a common whore, a rip-off artist, a closet drunkard, a 
white collar thief, a racist, an anti-Semite, and others. In addition to socially isolating 
the target, the handlers also seek to cause the target anxiety and other psychological 
problems that drive him to a psychiatrist, who then diagnoses him as schizophrenic. 
The handlers know that once the target sees a psychiatrist and it becomes a matter of 
record, the target’s sanity becomes an issue. Afterward, whatever the target says will 
be treated as suspect. This is important to the handlers, as they know that the target 
will be discredited if he seeks out law enforcement. 

(11) Register the target’s emotions. Their software allows them to use the target’s 
pulse rate and probably other methods to record emotions such as anxiety, panic, 
fear, frustration, anger, sadness, loneliness, and others. The emotions actually appear 
in the form of words that surface in your thoughts, e.g., frustration, loneliness. In 
addition, the perverts continually whisper those words into your brain to actually cause 
those emotions. Handlers prepare loop play tapes of whispers whose design is to play 
on the target’s emotions. (More about whispers later.) 

Moreover, their computer software is programmed to alert the handlers when targets 
think of certain topics. In my case, a computerized female voice will say in a reproving 
manner, “Max.” At that point, the handlers cease their continual general talking and 
whispering and instead concentrate on that topic. A voice on the computer often says 
“Good” when I think along the lines desired by the handers. This re-enforces the 
conditioning of targets that the handlers attempt to accomplish. 

(12) Cause mood swings. The handlers’ mind control programs can cause moods that 
range from explosive anger to total complacency. This causes erratic behavior in the 
target that is seen by many observers as a mental disorder. 

(13) Transmit voices into the brain that only the victim can hear. When I first heard the 
voices, I was driving. The radio was turned off, as it normally is when I drive. The 
voices seemed to come from near the driver’s door side panel. My first thought was 
that a device, or a bug, had been planted in the vehicle and was somehow being used 
to project the voices. A sweep of the vehicle by a private detective the following day 



26 


did not reveal a bug. Still, it took me a couple of more days to realize that the voices 
were coming through my brain, not the vehicle. 

The perpetrators of mind control are very methodical and deliberate. Trainers of the 
handlers must have studied a very detailed training manual. At first, the handlers 
normally only call the victims ugly names, then they gradually begin to talk directly to 
the victim. In my case, there are three principal voices as well as a far-off sounding 
voice that sounds like a female shouting. All of that is deception. The shrill far- 
sounding voice is synthesized to sound shrill and distant. One person can use all 
three voices. In addition, several handlers rotate in shifts, using the same three 
voices. Moreover, males assume female voices and vice versa. The handlers can 
also hit certain keys on their computer to repeat often-used phrases and sentences. 

Over time, the victim learns that he can actually talk back to the handlers. Finally, the 
two parties establish a dialogue albeit in an acrimonious fashion. Once I found out 
that I could also “speak” to the sickos telepathically, I used that ability to ridicule, 
taunt, and demean them. Then, I later learned that that is exactly what they wanted 
me to do, as it established a stronger link between those speakers and me and got 
me accustomed to dialoguing with them. 

Every target who is electronically harassed by remote is also subjected to mind 
control, often without his knowledge. Whether the target realizes it or not, his brain is 
being continually hammered twenty-four hours a day by at least two levels of voices. 
Naturally only the target “hears” those voices. Oftentimes the target does not hear the 
voices. Nevertheless, they are there. The voices may be projected 
“aloud” (telepathically) or in whispers. One layer of voices are the actual handlers 
hammering away at the “crazy” theme, telling him lies about family and friends, and 
attempting to keep him from engaging in any meaningful activities. Another one is an 
underlying loop play tape of recorded voices inaudible to the victim’s conscious mind 
telling him that he is crazy, making deviant sexual suggestions, and deprecating the 
victim in many other ways. MIND CONTROL CANNOT BE ACCOMPLISHED 
WITHOUT THOSE VOICES. 


The handlers normally disguise their voices. Simulations can easily be made by 
computer programs readily available in any computer store. Moreover, various 
handlers will alternate using the same voices; thus, causing the target to think that the 
same three or four voices that he hears are monitoring him twenty-four hours a day. In 
fact, oftentimes there is only one handler using three or four different simulated 
voices. Moreover, they can mimic regional accents in a very authentically-sounding 
manner. 

Moreover, the handlers can program certain actions to take place at certain times. For 
example, they can program their device to send jolts to targets whenever those 
targets are immobile for longer than, say, ten minutes. They can also program the 
hours at which targets will receive the vibrations and the circumstances under which 












27 


they receive them. They can perhaps even pre-determine the strength of those 
vibrations, based upon the targets’ thoughts. 

Even much of the subliminal talking of the handlers is automated. Many of the 
subliminal voices that targets hear are pre-recorded and played back either 
continually or at programmed times. The automation allows the handlers freedom of 
movement and limits the manpower required for monitoring targets. With automation, 
one single handler can efficiently monitor a target for many hours at a time. It is also 
highly probable that the handlers have a handheld device that allows them to perform 
their tricks while on the go. 

Nobody quite understands how telepathic (non-auditory) communication occurs; yet, 
that it exists is absolutely undeniable. As early as 1952, a scientist briefed the 
Pentagon on the “possible uses of ESP [extra-sensory perception] in psychological 
warfare.” Since then, research on that topic via the intelligence community has 
become part of the government’s experiments on mind control. In the 1970’s, Stanford 
Research Institute engaged in intensive research on it, calling the telepathic 
messaging “remote viewing.” Experiments included giving selected persons only 
geographic coordinates and asking them what they saw there. The results were 
astonishing. The Russians have long been interested in telepathic communication and 
have attempted to train their astronauts to communicate non-verbally. 

The handlers constantly repeat certain phrases to the target and make suggestions to 
him, oftentimes of a sexual nature. As they make those suggestions, they mention 
names of family members and friends of the target. After hearing those suggestions 
day after day, finally, the target expects to hear those phrases and expects to hear the 
innuendos. The next step is for him to start relating to those suggestions and believing 
them. Such is the perverse psychology employed by the depraved individuals who 
handle the targets. I believe that many of the aberrant acts that we see in the media 
stem from subliminal suggestions that perpetrators of ESMC make to targets. 

There is growing proof that the equipment of the perpetrators of the ESMC also has 
the ability to communicate with third persons, or persons who ordinarily might interact 
with the target. Those persons are instructed subliminally to say certain things and 
use certain words that cause the target to believe that they are accomplices out to do 
the target harm. The third parties are not aware of their brain manipulation. Likewise, 
most targets are not aware of that capability, and thus do indeed believe that those 
people are working against him. Unlike willing and paid accomplices, those third 
parties unknowingly do the handlers’ evil work. 

About a year ago, the handlers started repeating my thoughts back to me. There are 
several possible explanations for the handlers’ doing that: (1 ) They are recording 
those thoughts on tape, which they probably forward to another location. (2) They are 
repeating the thoughts to others either present or also monitoring me who cannot hear 
those thoughts. The thoughts are probably picked up over earphones attached to the 
computer. Perhaps only one person can listen at a time; thus, they repeat the 



28 


thoughts to others. (3) They simply seek to annoy me and continually remind me of 
their capability of hearing my thoughts. (4) The thoughts may be echoes of my own 
psychological “voice” and projected back to my skull as a different voice. 

In “talking” to the victim’s brain, the handlers use code words and expressions. Many 
of them are embedded in their statements and not readily recognized as code; others 
are very obviously code. Regardless of how the codes are stated, they signal to the 
target’s brain certain reactions that the handlers expect of him. If a victim notices the 
context, or situation, in which the handlers use the codes and his bodily or mental 
reactions to their codes, it is not difficult to figure out the meaning of most of those 
codes. For example: “I scream,” or “ice cream,” both pronounced the same, instills 
anxiety; “Come in,” spoken as if they were inviting someone into their home, opens up 
the victim’s mind to questioning; The expression “beats the shit out of me” makes the 
victim feel an urge to defecate; and “I see you” and “I hear you” prepare the victim 
psychologically for brain “mining” by the handlers. “Go git ‘im” causes an involuntary 
erection. All handlers probably have their own lexicon. 

The code words and expressions used by the handlers strongly hint that the handlers 
employ hypnotic pre-suggestions to trigger thoughts and actions in targets. Several 
times I have awoken suddenly during the night, when the handlers have not yet 
realized that I was awake, to hear very weird music and the drone of a kind of singing, 
or chanting, using particular words. On one occasion, a male was chanting, and I 
heard the word “vibrate” or “vibration” and my code name “Estados Unidos.” Then he 
started a kind of chant in which he repeated, “We love you.” The “love” thing is most 
definitely deception. The chanting may have also been deception. 

Much of the handlers’ talk and the holographic images that they project into the 
victim’s thoughts relate to sexual themes. They particularly emphasize deviant sexual 
behavior. Almost all of their induced thoughts and dreams involve sex. The perverts 
particularly seem to enjoy sodomizing the victims with whatever means they use 
(perhaps directed sound aided by psychological suggestion). Other victims with whom 
I correspond have mentioned the same sensation; others are probably too 
embarrassed to mention it. The emphasis on sex appears to be more or less standard 
operating procedure in ESMC cases. Most targeted individuals report handlers’ 
voyeurism and infatuation with genitalia. 

The evil nature of the handlers comes across clearly. For example, they laugh and 
taunt as I pray for friends and family with serious physical problems. One of those 
persons is an eighty-six year old man who has suffered with cancer and heart 
problems for years and who is legally blind. Another one is a baby about six months 
old who because of birth defects wears a pacemaker and a feeding tube. The perverts 
are well aware of those peoples’ conditions; yet, they poke fun at them as I pray. The 
handlers also demonstrated their evil in taunting as an elderly aunt, the last of twelve 
uncles and aunts, lay dying 



29 


As the target forms thoughts in his mind, the handlers’ computer apparently provides 
the handlers dates, biographical facts, and other information to add to and correct the 
target’s thoughts. The purpose of this is to intimidate the target into believing that the 
handlers are all-knowing. The handlers, in fact, often blank out data in the target’s 
mind so that they can supply the information to him. Moreover, the handlers include 
all professions and occupations. For example, if the target is a carpenter, one of the 
handlers on every shift will be very knowledgeable of carpentry. 

Very curiously, the handlers use many odd means to project their voices. When I 
shower, the handlers cause voices to come over the falling water. The second I turn 
off the water, the voices stop. Once again, that hints at directed sound. They can even 
cause my stomach to “growl” and inject words and phrases into the resulting growling 
sound. Sometimes when I push or pull an object and friction occurs, I can hear the 
handlers’ voices. I gradually learned that the voices are recorded on loop play tapes 
and played continually to my subconscious, constantly re-enforcing the handlers’ 
objectives. 

The handlers may also know several languages, including Spanish. In addition, their 
computer software can interpret all major languages. That type software has been 
available for years and is in fact used to make actors in movies appear to be speaking 
different languages from the original ones used in making the films. Latinos, Afro- 
Americans, and East Indians have physically cooperated with the handlers in 
harassing me at various times; however, they were probably simply accomplices and 
not a part of the ESMC teams. 

As in the case of the electronic torture, the voices will follow the target wherever he 
goes. For that reason, it appears that satellites are probably somehow used to project 
the voices. In a 2003 article named “Shocking Menace of Satellite Surveillance,” 
author John Fleming writes that satellites are employed for “manipulating a person's 
mind with an audio subliminal ‘message’ (a sound too low for the ear to consciously 
detect but which affects the unconscious). In trying thereby to get a person to do what 
you want him to do, it does not matter if the target is asleep or awake.” If satellites are 
not used, then some other wide-ranging object such as radio towers and cell phones 
may very likely provide the constant contact required for conveying the electronic and 
mind control assault. 

The voices are crucial to mind control. In using the voices, the handlers seek several 
objectives: (1) Make the target doubt his sanity. (2) Cause the target not to be able to 
distinguish his own thoughts from the thoughts sent to him by the subliminal voices. 
The thoughts inserted and injected into the target's mind through the subliminal voices 
mingle with the target’s own thoughts. The brain cannot readily separate the natural 
thoughts from the inserted thoughts. This, of course, influences the target’s actions 
immensely. Those actions are normally negative and adversely affect his well being. 
(3) Distract the target. By constantly filling his mind with ugly, directed, and oftentimes 
meaningless garbage, the handlers confuse the target’s mind. That makes him very 
vulnerable to mind control actions. The handlers do not have to be skillful 



30 


psychologists to do this. Most of the content injected is crude and extraneous. (4) 
Cause the target to hear words and phrases intentionally programmed for him to hear 
while watching TV and listening to normal conversation. Usually those words and 
phrases that he is programmed to hear will be either very negative thoughts or nasty 
sexual suggestions. He is led to believe that they are his own thoughts; thus, this is 
similar to Number 2 above. (5) 


Subconscious Whispers 

Very importantly, in addition to the “audible” telepathic talking (audible only to the 
target), mind control targets should be aware that their handlers also continually 
whisper into their brains in tones so low in volume that the target’s consciousness 
does not pick them up. The victim is completely unaware of the whispers, which 
makes them all the more dangerous. It took me years to “hear” those subconscious 
whispers. Many targets never hear them. Nevertheless, they are there. The sub- 
conscious whispers are one of the handlers’ most formidable weapons in mind 
control. 

Through their sub-conscious whispers, the handlers control what you think of and how 
you react to people, including your spouse, parents, siblings, and children. They 
control how you perform on your job site, how you view your job, and how you interact 
with your colleagues. They also control your daily life: what TV programs you watch 
and your opinions about them; what newspapers you read and how you interpret that 
news; where and how you grocery shop; even when you go to the bathroom and what 
and how much you eat. Only those targets who hear the whispers can know the 
extent to which the handlers’ consummate evil influences targets’ thoughts and 
actions. 

The whispers are part of the handlers’ voice-to-brain messages that operate on three 
levels: 

(1) “Audible” messages that the target (and only the target) hears as talking “aloud” 
and projected telepathically into his brain. This occurred to me in December, 2005, as 
I was driving in Texas near the Mexican border. Naturally, only the target hears those 
voices. 

(2) “Audible” whispers, which some targets may “hear” as they are being directed into 
his subconscious. I developed the ability to hear those whispers only about a year 
ago. I am not certain whether the handlers wanted me to hear the whispers or I simply 
learned to hear them despite their secrecy. 

(3) “Inaudible” whispers and talking conducted by the handlers as an undercurrent of 
the former two messages. The target cannot “hear” the third level whispers and 
talking, which run concurrent with the audible ones and ply the target with subliminal 
messages 24/7 on loop play tapes. Because they cannot be heard, the third level 
messages constitute a very grave threat to targets. 



31 


I discovered the third level of messages strictly by accident or perhaps through the 
intervention of The Great Spirit. One night, I noticed that whenever my beard stubble 
brushes against the pillow, causing friction, I could hear voices in addition to those 
voices and whispers that I could already “hear.” However, the new voices seemed to 
come from INSIDE the ears. In addition to hearing the voices when I turned in bed, I 
also heard third level messages occasionally when I slid an object over another 
object, creating friction. The friction apparently causes the third level voices to 
become “audible,” much like an old phonograph needle on a record. 

After listening time after time to the third level voices, I learned to distinguish what the 
loop taping tape was saying. As might be expected, it contained a sexual theme, 
repeating continually, “You’re horny.” The short sentence was pronounced in a Deep 
South-sounding accent, while is probably only a deception. Only recently (April, 

2009), I discovered another layer of “inaudible” loop play tape, repeating the message 
“Trust me.” Thus, I now know that the handlers play at least two loop play tapes to my 
subconscious simultaneously. There may be still a third and a fourth loop play tape, 
playing different messages. Time will probably tell. 

Targets can test themselves to find out whether they are being influenced without 
their knowledge by third level whispers. Place the palm of your dominant hand (that 
will usually be the right hand) over your ear with the large part of your palm well below 
your ear. Then, while pressing on your ear, swipe your palm upward a few inches. Do 
this repeatedly. At first, you will pick up only an unintelligible “sssssh” sound. 

However, by repeating the process many times and listening very closely, you will 
begin to hear the words. The words will consist of a phrase or short sentence, which 
is repeated over an unending loop play tape. You can hear the words in either ear, as 
they are going to your brain, not your ears. Probably not all targets receive the third- 
level whispers. 

People are not accustomed to hearing but one voice at a time. Indeed, when two 
people are talking to us at the same time, we’ll eventually turn to only one of them to 
listen to that person’s voice. The third level of voices doubtlessly seeks to influence 
the target’s thoughts and actions, much like the first two levels. However, in addition, 
its purpose is to confuse the target’s brain with the simultaneous messages. 

The various levels of subconscious whisperings take many forms, for example, 

— Giving victims negative commands. Their commands are often very subtle, for 
example: “If I were you, I’d . . . ; I think that you should . . . .; and Why don’t you 
In addition to the commands, the handlers, by employing the inaudible whispers, 
cause victims to misplace items, blank out names, dates and events, make errors 
while calculating and writing, say things out of context while talking with others, and 
act in strange ways that are completely alien to their usual demeanor and behavior. 
The perpetrators also attempt to ruin the health and looks of targets by encouraging 
binge eating. They whisper to victims that they are voraciously hungry or that they 



32 


should eat more sweets than usual. Their aim is to get the target hopelessly out of 
shape and debilitated. Their whispered commands are often sinister, causing targets 
to harm themselves. Some targets have actually committed suicide as a result of 
suggestions by the handlers and holographic images to that effect. 

The power of suggestion to the brain’s subconscious is truly amazing. The handlers 
condition targets for mind control by inducing “dreams” in which the victims plays out 
whatever role the handlers assign him. On one occasion while I slept, the pervs 
caused me to believe that I was an elderly Confederate veteran of the Civil War 
reminiscing about his experiences in the battle of Gettysburg. I was telling about my 
horse being shot and going down, about my being wounded, and about seeing 
comrades blown to bits with cannon balls. I woke from the “dream” with real tears in 
my eyes. 

— Making statements about the victims’ family members and friends intended to cause 
estrangement of relations between them and the victims and thus isolate the victim. In 
my case, the handlers continually mention my son, to whom I am very close, and my 
two sisters, always while causing an involuntary erection. Such is the evil nature of 
the ESMC assailants. I telepathically tell the handlers that they cannot damage my 
relationship with my son, that my love for him and his family is undying, eternal, and 
unconditional. Despite that, they continue to attempt to cause me to think of him in a 
different manner. 

— Causing victims to think in negative terms about almost everybody and everything. 
Their device(s) cause absurd thoughts in victims. For example, I have an elderly first 
cousin whom I like but to whom I am not particularly close. We rarely visit. Yet, one 
day while thinking about calling her, the thought of being an heir of hers surged into 
my mind. My cousin has three children, several grandchildren, and even great- 
grandchildren. That negativity colors many of my normal thoughts. Their software also 
causes me to hear negative and suggestive words in place of ordinary words when I 
watch TV or listen to the radio. 

— Blanking out certain thoughts. The handlers’ whispering can not only cause targets 
to think about the topics that they project into targets’ minds but also cause targets to 
fail to think about important matters. The handlers delight in making targets forget 
appointments with people, leave items behind that they intended to take with them, 
and forget where they place common household items. They will also cause the target 
to forget names of people so that they can provide him those names, an attempt to 
create a dependence on the handlers’ information. 

-- Introducing deviant sexual ideas and feelings that victims would dismiss and reject 
if they were conscious of them. The handlers continually emphasize incest, 
necrophilia, and other sordid sexual acts in their talking. I cared for my bedridden 
mother for eight months before she died; on one occasion, the sickos showed me a 
holographic picture of my climbing into bed with her just after she died. 



33 


-- Creating in victims a lack of confidence in themselves by disparaging their 
capabilities and accentuating their faults. Whenever I work at home improvement 
projects or assemble items, the perverts ridicule, taunt, and curse during the efforts, 
telling me that I’m doing it wrong. Indeed, they do their best through their voices to my 
brain to cause me to do it wrong. 

- Sending victims on wild goose chases and believing things that are not true. This 
has happened to me on various occasions, once, for example, when handlers sent 
telepathic thoughts about the owner of a defunct radio station in another city that I 
suspected may have been a clandestine site of the local operations center, and I 
actually went and located his house. On another occasion they convinced me that 
surveillance bugs were hidden throughout my house, and I took screws out of 
receptacles and other items. 

In still another instance, they made me believe that my nephew’s business computer 
had been hacked to obtain his business transactions and accounts and that one of his 
employees was responsible. They also caused me to believe that a particular 
Penecostal church was responsible for the electronic and mind control activities 
employed against me. The handlers even provided a fake name of the minister of that 
church. Today, in traveling I must be very careful, for the handlers will cause me to 
make errors in driving, for example, turning at the wrong exit or missing an exit ramp. 

- Repeatedly telling the target that he is crazy. One of the aims of the sociopaths is to 
cause the target to think that he is losing his mind. I continually tell the handlers who 
monitor me that THEY are the nut cases, not I. 

- Inducing anxiety. The handlers especially attempt to induce anxiety when the target 
is emotionally vulnerable. In the summer of 1999, not long after my mother died, I was 
sitting in the patio when I suddenly panicked. I had never experienced anxiety. 

The anxiety endured for several months. During that time, I saw a psychiatrist twice 
and took two prescriptions of Prozac. The handlers undoubtedly expected me to 
commit suicide. However, a greater force took over, and I gradually rose above that 
problem. The psychiatrist dismissed me after two visits, telling me that I did not need 
him. In a few months, I got off the drugs completely and have not taken them since 
then. Now that I know that the anxiety was caused by the handlers’ whispering, I will 
never take medicine again and I will never again succumb to their induced panic 
attacks. Nevertheless, they still continually attempt to cause anxiety. In my case, the 
code word that they use to induce anxiety is “I scream,” which when pronounced 
together sounds like “ice cream.’ 

-- Extracting information. By asking questions with their whispers, the handlers can 
learn information not only about the target but also about his relatives and friends. For 
example, whenever the target thinks of a person, he will also think their first name. Let 
us say that the person who comes to the target’s mind is named Joe. All the pervs 
have to do is whisper, “Joe who?” The target then tells the handlers Joe’s surname. I 



34 


have attempted to resist telling the handlers surnames; yet, there is something in the 
human brain that makes him think of the last name whenever someone asks “Who?” 
The handlers, of course, know that and use it to their advantage in obtaining 
information about many people whom the target knows. 

Although the handlers know your social security, credit card, and driver license 
numbers, your email passwords, and your checking and savings account numbers, 
they will not use that information for criminal purposes. They have strict orders from 
their bosses not to do anything that can be traced. Thus, the handlers are not 
swindlers and con-guys. 

— Getting the target to trust them. That was borne out in the third level whispering that 
I discovered, saying continually through the loop play tape, “Trust me.” My handlers 
also continually tell me in the “audible” subliminal talking to trust them. I laugh at them 
and ridicule them for thinking that I might possibly ever trust them. Trust psychopathic 
criminals? 

Other Manifestations of the Handlers’ Voice-to-Skull (V2K) Messages 

The ESMC assailants are also able to project voices and other sounds through 
objects near the victim, i.e., the TV, a PC, and other electrical devices and even into 
the open air near him. Their sounds can take the form of knocking on the walls, wind 
and rain, dogs barking, falling stacks of lumber, and birds cooing or singing. Some of 
those sounds might be heard by others if they were present; however, the stalkers are 
careful not to make the noises if there are visitors. I live alone, as many victims do, 
and my dog often barks at some of the noises that the stalkers project into the yard 
and pasture. One can buy computer programs that make those same sounds. 

The stalkers can send their voices through a radio, even when the radio is turned off. 
They can also make you think that people at nearby tables in restaurants and other 
public places are talking about you by projecting voices into your ears/brain that seem 
to come from their direction. (Directed sound again?) In applying their evil, the 
electronic stalkers make use of equipment that changes their voices to hide their 
identity. Voice changing programs are readily available on the internet for purchase. 
They can also duplicate the voices of people with whom you often talk . 

I reject completely the belief by some targets that the handlers practice behavior 
modification. Behavior modification implies turning bad into good. If there is an 
element of behavior modification in their actions, it is to form aberrant behavior, not 
exemplary behavior. No, their purpose has nothing to do with behavior modification. In 
my opinion, the handlers are only perverted hireling manipulators working for the 
powerbrokers. 

However, knowing is conquering. After I had been made to look ridiculous several 
times by my handlers, I learned to discipline my mind from falling for the handlers’ 
whispered schemes. I am now very careful about what I do and how I go about it. The 



35 


handlers also used to delight in making me forget to take items with me when I left the 
house and forget where I had placed other items. I used to sometimes lock my keys in 
the vehicle. Now I make a concentrated effort to ensure that when I leave the house I 
have everything I intended to take with me. I also now rarely misplace items in the 
house because I am much more alert. 

In addition, my memory has actually improved, as I now concentrate on names and 
facts. The handlers’ whispers can still make me forget someone’s name or a place 
momentarily, but a while later, I remember them. Of course, sometimes the handlers 
do this intentionally so that they can “help” me remember. I have learned to be very 
careful, knowing that they will make me forget something so that they can supply the 
answer, trying to make me dependent on them. More elementary psychology. The 
handlers’ computer software has programmed me to reverse many of the letters in 
words that I type, for example placing a particular vowel before a particular consonant 
or in the wrong place. I have to be very careful now in typing and then go back and 
review what I have written before sending anything by email. 

(14) READ A VICTIM’S THOUGHTS. There is irrefutable proof that many university, 
medical, and defense contractor scientists have developed microchips and other 
devices that operate with computer programs to achieve that capability. Many of those 
methods have been patented. Scientists know that certain radio frequencies can pick 
up the natural frequencies of the human brain. 

My handlers at first made me believe that their equipment picked up only a few one- 
and two-syllable words of my thoughts. I even heard them talking excitedly about 
picking up those fragmentary thoughts. That was total deception. They have long had 
the ability not only to pick up complete thoughts. In fact, their device intercepts a 
target’s thoughts BEFORE those thoughts fully develop in the target’s conscious. The 
handlers always hear the target’s thoughts a few words before the target becomes 
aware of them. 

Sometimes the handlers play my thoughts back to me in my own voice, with my own 
accent, and with my own pronunciations. I have often wondered why. Perhaps it is 
just another psychological tool thrown into the equation to annoy the targets, for it is 
does bother targets that they self-consciously “hear” their own thoughts, or perhaps it 
makes recording the targets’ thoughts easier to do. 

People think without realizing that they are thinking. They cannot help thinking. That is 
quite natural. It is a psychological phenomenon that once targets are aware that the 
handlers can read their thoughts, the targets subconsciously articulate those thoughts 
carefully, knowing that somebody else is “listening.” Instead of simply thinking 
naturally, targets become very conscious of their thoughts and will make sure that 
those thoughts are very clear. They will even “explain” those thoughts. 

The handlers’ device causes that consciousness of thought to aid the handlers in 
hearing and seeing the thoughts more clearly. Moreover, when a target’s thoughts 



36 


occur, the handlers’ computer program will use the target’s own thoughts to steer him 
in a particular direction to a specific topic. The handlers reinforce the computer’s 
capability by whispering instructions to the target. The handlers want targets 
eventually to be unable to distinguish their own thoughts from the handlers’ induced 
thoughts. Their point is to control that person’s actions. I often tell my handlers 
telepathically, “if your commands just happen to coincide with my natural actions, it is 
mere coincidence.” That may be true now, but it was not always so. 

I have already mentioned that mind control cannot be achieved without the subliminal 
voices. Likewise, it cannot be accomplished without the computer programs that the 
handlers use. Those programs not only make sound effects, simulate voices, and 
perform other readily discernible sounds but they also program many of the mind 
control functions. For example, the computer can program a target’s thoughts to view 
people in a negative context. A target’s thoughts about a specific person can be 
programmed in a specific way, and they can also be programmed differently for 
particular persons. Programmed thoughts about others are often sexual; they can also 
make the target believe that a person is stealing from him, that another person is 
poisoning him, that a person is talking about him behind his back, etc. They can also 
program the target to act and react in certain ways. The programmed thoughts and 
actions aid the handlers in totally isolating the target from society and convincing him 
and others that he is crazy. 

The handlers not only hear one’s thoughts, probably wearing a headset attached to a 
computer, but they can perhaps also see the thoughts in writing on their monitor. 

When my handlers repeat my thoughts so that I can hear them telepathically, they 
also repeat some words, like “the,” as if a third grader is reading from a book. Of 
course, that may simply be deception. If the thoughts are indeed being recorded in 
writing, a narrative of those thoughts probably appears somewhat like the 
computerized captions for the hearing impaired on TV. 

The handlers’ equipment and software can also see and record the very images that 
your thoughts see. In other words, they can also see what you see in your thoughts 
on their monitor! Science fiction? Hardly. Knowing that they can see my thoughts, I 
have learned to project images, scenes, and actions to the handlers. Sometimes 
when I hear good jitterbug music, I show myself dancing. They comment on the 
dancing. 

The mind reading capability not only gives stalkers access to everything in the victim’s 
mind but also provides them massive amounts of information about friends and family 
members of victims. The stalkers feverishly exploit this information 24/7. In my case, 
the stalkers constantly whisper the names of my son, two sisters, friends and 
acquaintances, and even people whom I do not really know but who might creep into 
my thoughts to gather information about those individuals. Knowing my thoughts also 
gives the stalkers my computer passwords (and thus control over my 
communications), information about my business matters, and previous knowledge of 
my actions and movements. 



37 


The perverts’ equipment and software also have the capability of inducing “dreams” 
and thoughts while the victim sleeps. In those dreams and thoughts, the handlers 
introduce certain people, some of whom the victim knows, though not always very 
well, and others who are unknown to the victim. In the dreams, they set up particular 
scenarios in which the victim is the principal actor, doubtlessly to study his interaction 
with the other actors. In addition to the induced dreams and thoughts, the handlers 
also start sentences and then stop, letting the victim finish those sentences. And they 
flash photos before the victim’s eyes while he is in a dream-like state of 
consciousness and ask him questions about those people. I have awoken suddenly to 
see pictures being passed in rapid succession before my eyes. Their monitors register 
the victim’s pulse rate, emotions (including his sexual inclinations toward other people 
and his level of anxiety), whether the victim is telling the truth about questions he is 
being asked, his dislike of or fondness for certain people, places, or objects, and 
many other physical and psychological reactions. The handlers’ objective is to learn 
targets’ psychological foibles and physical weaknesses and then exploit them. 

Of those capabilities, Number 13, voices, and Number 14, mind reading, loom above 
the others in conquering the victim’s mind and spirit. In fact, hearing voices and 
having minds read sound so incredible that most victims do not report their electronic 
stalking and mind control assault to law enforcement. After all, if one hears voices and 
believes that people can read his thoughts, he must be crazy. And that is exactly what 
psychiatrists tell victims, that they suffer from dementia or delusional paranoia- 
schizophrenia. 

Several targets with whom I have corresponded claim that their handlers can inject 
mind-altering and body-function drugs into their bodies. While that may be possible, it 
presupposes that those drugs have already been deposited somewhere in their 
bodies and poised for release at some point. That probably can actually be done. 
However, I suspect that the targets’ handlers deceive them into believing that those 
drugs are being administered by playing with their minds. Again, pre- and post- 
hypnotic suggestions may figure in that belief. 

The Essence of Mind Control 

Mind control follows a well established plan, based far more on psychology than on 
electronic assault. There are three sequences to that plan. 

(1) Surveillance. In this sequence, the handlers not only watch and listen to the 
target’s conversations with others and monitor his movements but they also, through 
their method of “hooking” the target’s brain, silently “mine” the target’s thoughts and 
memories. The object is to reconstruct the target’s entire life, identify all relatives, 
friends, and acquaintances of the target, and learn any smut and dishonesty 
connected to the target to later make him feel guilt. In addition to “mining” the targets’ 
thoughts and watching their activities, the perpetrators interview people who know the 
targets, their family members, and their friends. Those people often unwittingly 



38 


divulge information about the targets through “friendly” conversations with the 
perpetrators’ agents. Sometimes, the agents pose as law enforcement officers and 
private detectives to intimidate people into telling all they know about targets. Actual 
law enforcement officers also doubtlessly cooperate in some cases. Only with this 
knowledge can mind control be used effectively. 

(2) Silent voices through their voice-to-skull method. The target will not be aware of 
this; yet, handlers are conditioning him or setting him up psychologically for the last 
and final step of mind control. During this time, the handlers may begin their electronic 
torture. 

(3) “Audible” voices (V2K) heard only by the target and augmented by consistent, 
continual, and strong electronic assault. With the knowledge gained in the first 
sequence and the pre-conditioning accomplished in the second sequence, the 
handlers now begin to bombard the target with voices that only he can hear, 
manipulate his thoughts and actions, and generally torment him. They hope and 
expect that the outcome will be the total disability of the target to function in society. 

Mind control is achieved through a combination of psychological trickery and 
electronic effects. The electronic effects are largely utilized to re-enforce the 
psychological aspects of mind control. Although the electronic effects are painful and 
sometimes even debilitating, they are usually bearable. As long as people have 
control of their minds, they can normally handle pain. On the other hand, mind control 
seeks to dominate both the mind and the body of targets, to gain absolute control over 
those persons and manipulate their every thought and action. Make no mistake about 
it; handlers are highly trained in both psychology and computer/electronics. They may 
not be very savvy about the field of psychology; yet, they’ve been taught how to apply 
it. They are probably far more adept at applying and understanding the electronics 
than the psychology. However, whoever wrote the ultra-secret training manual, 
probably a team of psychiatrists and intelligence interrogators, were masters in 
psychological application. 

Let me re-emphasize that mind control cannot exist without the handlers’ capability of 
voice-to-skull (V2K), i.e., subliminally talking and whispering to targets. Again, the 
brain of every true Tl hears that subliminal talking whether the actual target realizes it 
or not. 

Mind control seeks to disenfranchise the target of his ability to function through a 
series of clever psychological tactics. We have already mentioned several of those. 
Here are some others. 

(1 ) Knowledge of surveillance. After a long period of observation and “mining” of the 
targets’ thoughts, the handlers let targets know that they are objects of electronic 
surveillance. They reveal that they know intimate details of the targets. The total loss 
of privacy of thought unnerves the targets and makes them still more vulnerable to 
other psychological and electronic attacks. 



39 


(2) Loss of control of thought. Not only do handlers know the targets’ thoughts but 
they also plant thoughts in those targets. Targets find themselves thinking of subjects 
and performing acts that they ordinarily would not think or do. Those thoughts occur at 
strange times. Certain thoughts and reactions occur time after time. Many of them are 
sexual in nature. Targets may at first believe that those thoughts and actions are their 
own and they may be somewhat puzzled by them; however, they eventually learn that 
those thoughts and actions stem from subconscious suggestions made to the targets’ 
mind through V2K. 

(3) Humiliation. Humiliation of targets cause a feeling of helplessness in targets. It 
often occurs in the realm of sex. Male targets experience involuntary erections and 
female targets, artificially-induced orgasms. Again, this is accomplished through a 
combination of psychology and electronic manipulation. Here is an example: I began 
experiencing a partial erection throughout the day and night, and I knew that that was 
not natural. Then, one day while washing my hair I brushed the small hairs at the 
entrance of the ear canal, and each time I did I heard, “You’re horny.” The subliminal 
voices were toned so low in volume that my conscious could not pick them up. The 
continual repetitions of their loop play tape had convinced my brain of that suggestion. 
On another day, I also felt a very subtle vibration in my groin area, which, aided by the 
suggestion that I was horny, caused the erections. In addition, handlers tell targets 
through their V2K that targets have to defecate. This causes them to lose control of 
their bowels, another example of humiliation. 

(4) Making the target appear crazy. Through subliminal whispering, handlers make 
targets very forgetful. They forget names of people whom they know well. They forget 
where they place objects. They forget to do things on their list of things-to-do. By 
projecting voices, handlers convince targets that others are talking about them. All of 
that makes targets think that they are losing their minds or developing Alzheimer’s. 
Those same actions suggest to observers the same message. All true TIs are acutely 
aware of that mind control objective. 

(5) Assigning guilt. The handlers’ computer can cause targets to hear certain words 
entered into the handlers’ computer whenever they watch TV or converse with others. 
The words triggered usually deal with sex, violence, and other negative topics. 

Targets start believing that they are actually thinking those words. That causes them 
guilt, which aids the handlers in instilling and re-enforcing that very guilt. 

At first, I believed that the government, or some such powerful organization, might be 
experimenting on humans using electronic effects and mind control. Indeed, that did 
happen, probably in the 1960’s through the 1980’s. However, by the 1990’s mind 
control was already well developed and had been fashioned into an art and a science. 
Today no experiments are necessary. Mind reading and subliminal talking leading to 
mind control are already perfected, in full usage, and being carried out on a massive 
scale both in the United States and abroad. 



40 


Searching for Remedies 

After one discovers that he has become “hooked,” he naturally grasps at ways to 
prevent the electronic and psychological abuse and neutralize the source. That effort 
becomes costly. Most targets are simply plain, middle class people, and dealing with 
electronic assault and mind control places a great strain on their financial resources. 
The handlers know this and encourage targets to spend their money on useless 
gadgets and remedies. 

The actions that I took to find a way to detect and neutralize whatever causes the 
electronic effects and voices (mind control) are too numerous to describe in detail. I 
will only summarize some of those actions. 

-- Services. (1 ) Paid $300 to a private detective to look for a bug in my vehicle and (2) 
$750 to another P.l. to provide information about a person I had reason to suspect. (3) 
Had dental work performed to re-do that which had been done abroad. (4) Had x-rays 
and a CT Scan made. This totaled well over $5,000. 

-- Gadgets. (1) Installed an NCH Tone Generator program in my computer. (2) Bought 
and wore a small stone medallion that was said to afford some kind of protection. (3) 
Purchased a Walkman-type device called the Jammer, which was useless. (4) Bought 
a Spy Audio Jammer that produced static supposed to keep outsiders from listening 
to telephone conversations. (5) Purchased a dozen small objects composed of metal 
shavings and crystals held together with heavy glue called Orgone Blasters. (6) 
Ordered and used a small device called the BIOPRO “Home Harmonizer,” whose 
manufacturer should be jailed for fraud. (7) Bought and used two devices, the RF Bug 
Detector and the Zap Checker, Model ZC185, to detect and measure 
electromagnetism. (8) Bought an expensive radio scanner that I thought might 
interfere with the handlers’ frequencies. (9) Bought and used neodymium magnets. 
(10) Many other objects, programs, and devices. I spent several thousand dollars on 
those items and materials. 

— Experiments. (1 ) Walked the outside perimeter of my house with small radio. If it 
lost its station and started buzzing, it was supposed to mean that my attack was land 
based. The stations remained clear. (2) Used ear plugs. (3) Exchanged a mattress 
with springs for one without them. (4) Encased head with aluminum foil at night and 
wore a ball cap lined with foil. (5) Turned several radios on at the same time tuned to 
different frequencies. (6) Coated a cotton cloth with peanut butter, wrapped it in 
plastic, and wore it over my head at night. (7) Took massive amounts of 
recommended vitamins and minerals. (8) Took for about nine months a chelating 
substance called Detoxamin, which cost over $1 ,000. (9) Made a Faraday Cage of 
chicken wire with a copper outside grounding rod. (10) Made and used a blanket 
made of heavy aluminum foil to sleep underneath. (11) Placed aluminum foil over the 
bedroom windows. (12) Used two 3 volt watch batteries, the positive side taped to one 
ear and the negative side, to the other ear, at night. (13) Deliberately exposed myself 



41 


to lightning during electrical storms. (14) Tried recommended isometric exercises. (15) 
Turned off the main breaker at night, cutting off all electricity within the house. 

Those efforts and expenditures yielded little or no result. I have not yet found 
any satisfactory way of locating, neutralizing, or lessening whatever causes the 
electronic effects and mind control. My advice to other targets is “save your 
money” and instead contribute to a scientific study to find the source of the 
electronic effects and mind control. You can also prepare fliers for a minimal 
cost to circulate information on electronic assault and mind control. 

In addition to falling victim to electronic assault and mind control, targets also become 
victims of scams. Some innovators conscientiously seek to find and invent objects 
and methods to dispel the electronic effects and eliminate mind control. Others are 
scam artists who capitalize on the desperation of victims and knowingly sell them 
useless and expensive items. Be sure that a breakthrough will occur. As I often 
telepathically tell my handlers, “The secret will come out. Nothing lasts forever.” 

After reading about targets rushing to the emergency room because of the handlers’ 
electronic torture, I determined early in my harassment situation that I would not follow 
that path. Instead, I deal with the electronic assault and mind control and defy the 
psychos. My guiding theme is “Whatever happens happens.” 

The Handlers’ Bosses 

In the foregoing narrative, I have talked about various techniques and actions of the 
handlers who perform the ESMC. That they are evil, degenerate voyeurs and 
psychopaths should be as clear to the reader as it is to every victim. However, the 
handlers themselves are only trained hirelings. Who empowers them? In other words, 
who gives handlers the permission or the orders to apply the ESMC. Who identifies 
the targets that they harass? Who provides them the devices and the know-how to 
carry out the ESMC? Let us look into possibilities of the “bosses” for whom the lowly 
handlers work. 

Michael Rothschild’s article in the February issue of The Progressive called “FBI 
Deputizes Business” identifies businesses as possible perpetrators of electronic 
torture and mind control. The article reveals that the FBI, now overseen by the 
Department of Homeland Security (DHS), formed a group of businesses called the 
Infraguard in 1996 under the Clinton administration (1992-2000) ostensibly to stem 
and pre-empt any perceived terrorist threat within the United States. The meaning of 
“terrorist threat” is at best very vague and gives those essentially FBI-sponsored 
vigilante groups the legal right to attack any American citizen whom they wish with 
absolute immunity. Law enforcement not only permits those groups to operate but 
probably also assists them. 

The Bush administration (2000-2008) built upon that little-known group in his 
post-9/1 1 attack on democracy as a key element in quelling any opposition or 


42 


suspected opposition to his regime within the United States. FBI Director Robert 
Mueller called that megalithic vigilante group the “first line of defense.” It does not 
require a molecular physicist to imagine the abuses that are certain to accompany any 
such para-law enforcement program. 

Many of those Intraguard “businesses” are Fortune 500 firms, including companies 
that hold defense contracts with the U. S. Government. It is a well known fact that 
businesses buy Congressional cooperation through Political Action Committees 
(PACs), which include religious, social, and civic organizations, some of which exist to 
promote the aims of foreign governments within the United States. Thus, broadly 
interpreted, Intraguard can include those latter organizations, such as the Jewish 
Defense League, the Anti-Defamation League, and radical pro-Israel and other 
Christian Fundamentalist groups, in its domestic terrorism program. 

The tentacles of those organizations reach into the smallest towns and even into rural 
communities. In sparsely populated areas such as many parts of the Deep South, 
Infraguard probably depends on small firms and businesses owned by ultra- 
conservatives to spy on and exert mind control upon selected targets. Those targets 
are very likely to be people whom the business owners dislike or are afraid of for one 
reason or another. 

It is not clear whether the FBI and other U. S. intelligence groups provide the names 
of the targets or simply allows the Infraguard to identify the targets. It is equally 
unclear whether the intelligence community does the actual “hooking” of the targets 
and then allows the handlers to perform their ESMC or whether the handlers may 
actually have a hand in the targets’ “hooking.” At any rate, the Infraguard’s weapons 
include monitoring targets’ computers and telephonic communication, physically 
spying on and “investigating” those targets, interfering with their mail, and monitoring 
the targets’ business and business contacts. 

Buttressing the powers of the Infraguard, a Bush Executive Order signed July 17, 
2007, allows Federal authorities to seize assets of dissenting citizens who "directly or 
indirectly" hinder Bush’s Iraq War agenda. If Bush’s tactics against war protestors 
were not a sufficient threat to American rights, on October 23, 2007, the House of 
Representatives passed legislation called “The Homegrown Terrorism Prevention 
Act,” which allows law enforcement to arrest individuals whom they suspect hold 
radical ideas BEFORE they “turn violent.” With powers that broad, it is not difficult to 
perceive that they also include using high-tech surveillance and neurological 
weaponry on those targets. 

If the FBI, other U. S. intelligence agencies, and law enforcement do not actually carry 
out the electronic and mind control assault on American citizens and residents 
directly, they can relegate that power to those organizations affiliated with the 
Infraguard program. Those groups probably include the following: (1) Big business 
and research facilities, particularly those with government defense contracts, and 
even smaller independent, individually owned companies in smaller cities and towns. 



43 


(2) Some PACs, including civic organizations. (3) Some religious groups, particularly 
the “born again” types. (4) Perhaps even intelligence-sharing foreign countries, such 
as Israel, which often operates through its subservient American organizations such 
as the B’nai B’rith, American Israel PAC (AIPAC), the Jewish Defense League, and 
the Anti-Defamation League. Those organizations are known to have maintained “hit 
lists” for many years. (5) Perhaps even segments of the medical community. (6) 
Almost certainly law enforcement. 

The perpetrators of ESMC as well as the means they use to apply it have to be known 
by the U. S. Government. Bill McIntosh, an ex-U. S. Navy defense employee and also 
a longtime target, authored a carefully researched paper on directed energy in which 
he says that the Defense Advanced Projects Research Agency (DARPA) conducted 
experiments in the late 1960’s on the health and psychological effects of low intensity 
microwaves. He quotes Richard Cesaro, Director of DARPA, as saying that the 
program's initial goal was to: . . discover whether a carefully controlled microwave 

signal could influence the mind" to be used "for potential weapons applications." 

The Department of Homeland Security has more recently created “Fusion Centers,” 
supposedly to “share information and intelligence [with state and local organizations] 
within their jurisdictions as well as with the federal government.” At this time (2009), it 
has about sixty centers and plans to create others. Those sixty centers probably 
coincide with the sixty FBI field offices. The word “fusion” means melting together. 

The Centers do indeed fuse units widely dispersed over the entire national territory of 
the United States of America. Big Brother has you covered. DHS intelligence officers 
operate in Fusion Centers in twenty-four states, including my state of Louisiana, and 
also in the District of Columbia. Plans call for more than a hundred federal 
professionals at those centers by the end of this year (2009). Much of the 
communication between the DHS and the centers is classified “secret.” 

The Infraguard and the Fusion Centers count on local groups and law enforcement to 
support the government’s increasing surveillance of and interference with American 
citizens’ everyday activities. Those organizations along with the FBI and other 
intelligence and law enforcement operatives represent an overwhelming presence of 
Big Brother in the lives of all Americans. Although surveillance alone does not 
constitute electronic and mind control assault, consider how simple it would be to take 
constant surveillance to the next step in parceling targets to vigilante-type groups of 
trained handlers for physical and neurological torture. 

I suspect, in fact, that there may be two distinct parties involved in electronic torture 
and mind control: (1) The major party actually “hooks” the mind through the still-secret 
device and method. That organization will almost certainly be elements within the FBI 
or some other Federal intelligence agency or agents of foreign governments. I believe 
that that organization also selects the targets, but it may also allow lists of names to 
be submitted to them for targeting. Rank and file FBI and other intelligence agents 
may only be vaguely aware of the electronic assault and mind control system; 



44 


however, higher officials and certainly those involved with Infraguard and the Fusion 
Centers have to be knowledgeable of it. 

The Handlers 

(2) After the first party hooks the targets, it turns the actual electronic torture and mind 
control activities over to a second group, the actual “handlers.” The handlers 
themselves probably do not know the intricacies of how targets are hooked. They only 
carry out the techniques of electronic torture and mind control on the targets. 

However, as the handlers work under the FBI and intelligence umbrella, they must 
have security clearances and be sworn to secrecy. That almost certainly limits those 
handlers to ex-, retired, and perhaps even current law enforcement officers, ex- 
military, and ex- and retired Federal employees. 

The handlers work in teams, and the members of those teams will not change, for 
they depend on continuity to capitalize on their knowledge of the target - his contacts, 
his business affairs, his behavior pattern, and his thoughts. There will be at least three 
handlers, so that working in eight-hour shifts they can monitor the target twenty-four 
hours a day. There may be more handlers working shorter shifts. There will also be an 
alternate or two, who are familiar with the target, in case a regular member of the 
handler team falls sick or has to attend an urgent matter. 

It is very important for all handlers to know everything possible about the target. Thus, 
members of the handler team will know each other well, and they will discuss among 
themselves their actions and the target’s reactions. Handlers may even consist of 
several family members working together. However, the handlers may not necessarily 
know all of the accomplices who assist them in gang stalking and other activities. 

The handlers’ operational sites will probably differ from locality to locality, depending 
on the identity of the handlers. If law enforcement is directly involved, secure 
departments of police stations and sheriff’s offices may be utilized. As law 
enforcement facilities operate 24/7, round-the-clock activities by handlers would go 
unnoticed. If individuals outside of law enforcement work as handlers, their 
operational sites may be located in safe sections of businesses, communications 
providers’ facilities, and private residences. There is a possibility that the handlers do 
not have to be physically located at a single site but are perhaps linked by remote 
through a shared computer and shared equipment. 

It should be obvious to any Tl that his handlers are professionally trained in the 
application of their electronic torture and mind control methods. It should also be 
abundantly clear that psychologists and psychiatrists had a hand in developing those 
skills and training those handlers. After all, that group assisted the CIA and the US 
military in developing interrogation and torture methods used against Guantanamo 
detainees, a program approved by The American Psychological Association. 



45 


The unending remote-operated electronic assault and mind control activities, often 
accompanied and re-enforced by gang stalking, are enormously labor intensive and 
costly. The sponsors of those efforts spend millions on each target. Would a company 
or business spend that much money on a single individual? Hardly. However, if the 
company or group receives secret funding from the federal government, that 
expenditure could be kept hidden. Some PACs and religious groups, working under 
government protection and with government funding, would also provide an excellent 
cover for state-sponsored domestic terrorism. 

No stalking activity, whether conventional or electronic, can be carried out without a 
conspiracy. That conspiracy probably includes the following elements: (1) Go- 
betweens, or liaison agents, representing the powerbrokers who make the equipment 
available, supply names of targets, and recruit, train, and pay the handlers. Those go- 
betweens are probably the same agents at the FBI field offices who coordinate with 
the Infraguard and Fusion Centers. (2) Handlers, who actually carry out the electronic 
and mind control activities, and (3) Accomplices, who play only support roles as 
ground stalkers and may not even be aware of electronic stalking and mind control. 

Targets suffer from indescribable physical and psychological torture. Yet, they can get 
some small satisfaction out of the fact that the handlers, who are obviously already 
seriously disturbed individuals, gradually become more psychologically ill and socially 
maladjusted the longer they ply their evil work. Over the years, the torture and 
voyeurism that they employ weighs upon their degenerate minds. Although they 
obviously enjoy making people suffer and receive tangible rewards for their efforts, 
they become obsessed by their activities, and their sick handiwork eventually leaves 
them as mentally affected as their victims. 

The Handlers’ Accomplices 

Electronic and mind control assailants also often depend on local accomplices to help 
with their aims. I classify the accomplices as active and passive. The first group 
actively participates in street theatrics, gang stalking, and entering targets’ houses; 
the second group knows what is going on but keeps quiet. Unknown persons have 
entered my house in my absence on several occasions and taken items and 
rearranged other items. In October of 2008 while I was away on a several-day trip, 
someone entered my house and took from the center of my bed a round magnet with 
which I always sleep that measures two inches in diameter by a half inch in thickness. 
That magnet never leaves my bed and my house. When I change sheets, it goes right 
back into the bed. The assailants’ purpose was doubtlessly to enter again while I was 
gone and replace the magnet, either in its normal location or in a nearby location, to 
make me think that I was losing my mind, one of the pervs’ main objectives. Targets 
often call that tactic “gas lighting.” Surely enough, I found the magnet in January, 

2009 in the back of a little-used closet. 

Accomplices of the ESMC perpetrators perform the actual foot work. Many of the 
accomplices work in legitimate businesses such as delivery organizations. In my 



46 


case, UPS has failed to deliver at least five items that I ordered or that someone was 
sending to me. Two of the items were returned to the senders without my being 
notified. Never once did a UPS driver leave a notice on my door or in my mailbox that 
he had attempted to deliver packages. Accomplices also work in the postal system, 
telecommunications companies, especially local internet providers, and other 
legitimate businesses. 

They local helpers of the ESMC assailants do not forcefully enter houses of targets 
but use master keys that open any locks. Likewise, they will never steal any item of 
great value. After gaining entry, the accomplices will rearrange items in the house or 
place them in locations where the target would never put them. Their mission is: to 
make the victim think that he is going crazy; to let the target know that they have the 
power to enter whenever they wish; to remind the target that he is under constant 
watch; and to frighten or intimidate the target. They once dropped a 9 volt battery and 
six AA batteries into my garbage disposal, which I discovered when I turned on the 
disposal. The batteries had come from a night table drawer where I keep them. That 
meant that the accomplices had inspected every area of my house and had gone 
through all of my belongings. 

Items taken will often consist of anything that they believe might be helpful in their 
mind control efforts. For example, on one occasion, intruders stole from my desk a 
roster of an English-as-a-Second-Language class that I had taught. That theft 
probably represented additional sleuthing into people whom I know, as they often 
mention names when they talk to me telepathically. 

State-Sponsored Domestic Terrorism 

Why have electronic stalkers and mind control artists and their accomplices not been 
caught? They will be. It is only a matter of time, perhaps a short time. However, their 
evil has long gone undetected and unpunished because of the following reasons. 

— They operate in total secrecy; therefore, their locations are unknown. The handlers 
probably take an oath of secrecy. Otherwise, one of the handlers tells a relative who 
tells a friend and soon the truth is out. 

— They employ a method or methods of electronic harassment and mind control not 
yet fully understood. There are those researchers who believe that handlers use, in 
addition to microchips, other means to communicate with the victims’ brains. 
Whatever method is used, it will require some type of transmitter/receiver, although 
those instruments may function slightly differently. 

— Their electronic stalking and mind control activities leaves little or no evidence. A 
part of the whole scheme is to operate in a manner that leaves no trace of evidence 
that could lead investigators to the perpetrators. The handlers count on victims not 
having tangible evidence to submit with their complaints of ESMC. Without proof of 
assault, of course, law enforcement has either the pretext not to investigate or finds 



47 


little cause to investigate. 

— Victims are reluctant to make complaints, as they have no proof of assault and 
cannot identity the assailants and do not want to appear foolish. 

-- Psychiatrists, doctors, and others in the medical community do not recognize the 
existence of ESMC. Indeed, if they acknowledge that patients who suffer ESMC are 
not paranoid schizophrenic, they then find themselves unable to treat those symptoms 
in the traditional psychiatric manner. 

-- Law enforcement has been almost completely uncooperative. 

The cowardly sneaks who carry out ESMC are textbook cases of domestic terrorists. 

In addition to committing terrorism, the stalkers are guilty of (1 ) stalking, (2) harassing 
with malicious intent, (3) coercion (in attempting to make the victim do things that 
he/she does not want to do with their mind control methods), (4) psychological and 
virtual rape, (5) breaking and entering (which they often do to intimidate the victims by 
unlocking locked doors, turning back clocks, moving items in rooms, hiding other 
items, etc.), (6) burglary and theft (which they commit when they enter a victim’s 
home and take items to confuse and disorient the victim), (7) recording a victim’s 
conversations without his/her consent, (8) peeping tom-ism (through their ability to 
view the victim), (9) assault and battery (by using electric shock, etc. against the 
victims), (10) slander (by circulating false rumors and stories that lack proof about the 
victim), (1 1) libel (when those rumors and stories are put into print in the from of 
emails, etc), (12) computer hacking and phone tapping, (13) conspiracy, (14) in some 
cases, blackmail and extortion, (15) first degree murder (when a victim suffers a fatal 
car crash because of sleep deprivation), and (16) attempted murder (when their plans 
do not succeed). Their list of crimes will put them away for the remainder of their evil 
lives. 

In addition, the domestic terrorists violate FCC and other laws regarding the illegal 
use of electronic equipment. However, they will NOT engage in credit card fraud, 
identity theft, extortion, blackmail, or any other activity that will force them to 
communicate in writing or that will be traceable. Should that happen, the FBI and local 
law enforcement would be forced to look into those crimes and record them as 
crimes. 

Keep in mind that electronic assault and mind control contains two elements: (1) 
electronic harassment and (2) mind control. The first element is often conducted from 
close range by persons using homemade or easily purchased electronic devices. 
Those criminals may live next door or in an adjoining apartment. The target will often 
have a good idea of the perpetrator’s identity and may even also be able to gather 
sufficient evidence to bring suit against that individual or individuals. Electronic 
harassment is very often linked to gang stalking. Those acts can oftentimes be 
recorded on videotape and presented as evidence although the victim probably 



48 


cannot count on the authorities for much assistance. Electronic harassment is also 
conducted by remote. 

On the other hand, mind control, which also invariably includes electronic assault, 
leaves no evidence and the perpetrators are unknown. The perpetrators operate by 
remote, perhaps over very long distances, and leave no trace of their work. I have not 
yet communicated with any mind control target who has been victimized in a traceable 
and prosecutorial manner. 

U. S. Intelligence: the NSA, FBI, CIA 

Does the U. S. intelligence community know about ESMC and how it works? A 
resounding yes. A journalist in a July 2008 Yahoo news article wrote about visiting 
Guantanamo and interviewing some of the detainees. One of them was Omar Khadr, 
an Islamic Canadian who was only fifteen years old when he was captured in 
Afghanistan in 2002 and brought there. Omar told the interviewer tearfully that he had 
lost both arms and both legs; yet, the boy was in perfectly sound physical condition. 
Interrogators and brain control experts from the CIA, DOD, and other U. S. 
intelligence agencies had taken control of his mind and had convinced him that he 
had no arms or legs. As I write, Gitmo prisoners are being allowed trials by Federal 
judges. However, Khadr’s lawyer warned that he is almost a basket case. His prison 
torturers doubtlessly erased any memory in his mind of his neurological torture. 

In my overseas work, I knew many CIA types, who posed as businessmen, 
employees of international voluntary agencies, missionaries and other clergy, and 
other non-governmental workers. In addition, each embassy and its official 
appendages provide cover for CIA agents. In general, I thought that those individuals 
had far more human defects than virtues. 

I praise President Obama for condemning torture by those elements. As targeted 
individuals can attest, the government has long had the capability to obtain 
involuntary information from persons by remote mind control. Thus, the torture of 
detainees, supposedly to obtain crucial information, represents only a sadistic excuse 
by torturers with otherwise little authority and decision-making power to carry out the 
evil in their twisted minds. 

The mind control handlers operate by remote. Thus, some type of instrument, or 
receiver/transmitter must be used to make contact with the victim’s brain. That 
instrument may be a scanner, ham radio, or a clandestine radio station guided by 
GPS. Regardless of the type of device, it must operate along a particular frequency, a 
frequency that can pick up the electromagnetic pulses of the human brain. If a radio is 
used, that frequency must necessarily be blocked. If not, any listener could happen 
upon that frequency and hear the whisperings and other mind control operations of 
the handlers, blowing the entire operations. If it is indeed a blocked frequency, the 
local law enforcement, the FBI, and the FCC have to know about and approve it, 
additional proof that law enforcement has to know about ESMC. 



49 


Since 9/1 1 the Federal Government has monitored all radio frequencies to prevent 
terrorists from communicating with each other. Intelligence routinely scans the air 
waves for suspicious activity. It is an inescapable fact, then, that the Federal 
government has to know about electronic stalking and mind control. If the Federal, 
state, and local law enforcement are not involved directly in ESMC, their unwillingness 
to investigate makes them knowing accomplices. 

I live in a rural area in Ouachita Parish (county) in north central Louisiana. In late 
2006, not trusting the local authorities, I made a trip to the nearby city of Shreveport to 
seek out the FBI to make a complaint about the electronic stalking and mind control 
activities. I outlined verbally to one of the agents what was happening. I also gave the 
agent a CD with parts of my journal and my thoughts about those effects. In fairness 
to the agent, I must reveal that I also showed him several items from my house that 
my handlers had caused me to believe were bugged. (He did not examine those items 
but pretended to make a note about them.) Later, I realized that the “bugs” were 
simply part of the handlers’ mind control games; the agent did not know that the items 
were NOT bugged. The agent asked me only two questions: was I homosexual and 
was I being blackmailed? Those questions strongly suggest to me that that particular 
group is being targeted with ESMC for purposes of blackmail, extortion, and perhaps 
annihilation and that the FBI is well aware of that exploitation. Naturally, I heard 
nothing else from that meeting. I visited that office a second time early in 2007 with 
the same result. 

The refusal of the FBI to listen seriously to complainants and to investigate their 
claims indicts that agency. An electronic stalking victim whom I later met in person 
had also recurred to the FBI to complain. The victim told me that the agent to whom 
she made her complaint said with a grin: “Makes you feel like you’ve got nowhere to 
turn, huh?” She stated that “He was quite aware of what I was experiencing.” That 
victim, a grandmother and a very soft spoken, almost timid person, had worked for a 
single telecommunications company for thirty-five years before she retired. Like most 
victims, she lived alone. A policeman lived next door and a Fundamentalist preacher 
lived across the street. 

For the sake of argument, let us consider that the FBI and local law enforcement just 
may be using electronic stalking and mind control, although illegal and inhuman, to 
attempt to combat crime. If there is any element of truth in that conjecture, it is not 
supported by statistics. Crime continues to grow at an alarming rate. Moreover, our 
government is based on the principle of “due process of law” and justice for all, 
including drug smugglers, murderers, rapists, and others. An indictment of crime and 
a trial by jury are the cornerstones of our democracy. When law enforcement 
becomes the judge, jury, and executioner by using covert electronic torture on targets, 
they trample on and make a mockery of those democratic principles. 

I searched the internet for statistics concerning the categories of FBI investigations. 
The FBI has about 60 field offices and over 12,000 agents. It has divisions whose 



50 


agents and clerical assistants continually investigate and surf the web for information 
on high-tech crimes and information relating to terrorism. The internet is literally full of 
references to electronic stalking and mind control, much of it in relation to terrorism. 
Yet, I did not find a single reference to the FBI’s having investigated a single case of 
electronic stalking and mind control activities. 

The FBI continually monitors and even infiltrates known organizations that engage in 
domestic terrorism. It is ridiculous to consider that the FBI does not know about high- 
tech harassment, the instruments used, and how the instruments work. Moreover, the 
FBI, Secret Service, NSA, and other agencies share the responsibility for the overall 
protection of the President, Vice President, cabinet members, Supreme Court 
justices, and Congresspersons. It is absurd to think that those intelligence agencies 
do not know about electronic stalking and mind control, how to prevent it, and, if 
discovered, how to neutralize it. 

The subject of electronic stalking and mind control remains taboo. The controlled 
media will not touch that topic, which hints at a conspiracy between the media and the 
government. Only on the internet, where data is still largely uncontrolled by the power 
brokers, can one find information on ESMC. In performing my research, I found on the 
internet multiple accounts by and about victims of ESMC, and I corresponded with 
scores of those targeted individuals. Most of those correspondents appeared to be 
regular people whom one would expect to live next door. Many of them had braved 
the stigma of being labeled schizophrenic to complain to the FBI and their local law 
enforcement. Not a single case had led to an investigation. 

There appears to be a sub-culture within the law enforcement and intelligence 
communities that endures regardless of which political party is in power and who 
might be the president. While other members and heads of law enforcement and 
intelligence come and go, that sub-culture remains just underneath the surface. It is 
possible that that underground, or rogue element, possessing the means to employ 
electronic torture and mind control, lent that method to various groups for their own 
purposes. 


Local Law Enforcement 

Like the FBI and other national law enforcement agencies, local level law enforcement 
has also been unresponsive to victims. There may be several reasons for that. 

(1) Local law enforcement knows little if anything about electronic stalking and 
neurological assault. Officers on the local level very seldom receive training in high- 
tech crimes involving the human body. If they have received training, that instruction 
probably covered only the electronic effects and did not address the mind control 
element. In addition, most law enforcement officers, as well as the general public, 
simply cannot comprehend how twenty-first century technology can be utilized to 
invade the human mind and affect the human body. 



51 


(2) Victims can normally produce no hard evidence concerning their complaints, let 
alone identify their assailants. As law enforcement rushes to point out, that gives them 
little to work with in pursuing the assailants. It also provides them a very convenient 
excuse to do nothing. 

(3) Victims are very reluctant to make complaints concerning neurological attacks for 
fear that they will be considered crazy and treated as such. Indeed, psychiatrists and 
others have convinced the world that persons who complain of electronic stalking and 
mind control must be textbook cases of paranoid-schizophrenia. I remained silent for 
three years after I knew what was happening for that same reason. When I finally did 
brave the stigma of being labeled crazy to present my complaints, surely enough the 
investigative officers apparently thought or pretended to think that I was crazy. 

(4) Authorities are reluctant to publicize information in the media concerning electronic 
and neurological attacks, as many citizens would become alarmed for their safety. 

The difficulty in enforcing laws making citizens safe from high tech assault causes law 
enforcement to maintain silence. The assailants are quite aware of the authorities’ 
dilemma, and they exploit that weakness. 

(5) In some cases, law enforcement may even knowingly permit and sometimes even 
abet and actively participate in those stalking activities. If not, they may have very 
good ideas about people and groups that might engage in electronic stalking without 
pursuing those ideas. It is no secret that law enforcement officials in many places 
have “protected” certain criminal elements either for money or other benefits or out of 
sympathy for those groups. Vigilante groups are known to enjoy police and other law 
enforcement support and protection in some areas of the United States. 

My experience with local law enforcement has been at best disappointing. After 
several years of enduring electronic stalking and mind control without having proof of 
it, I finally found that proof. Here is what happened. I read on the internet a victim’s 
advice that aluminum foil could ameliorate some of the effects of the ESMC. Thus, I 
placed heavy foil over the three windows of my bedroom. At night I could hear what 
seemed like puffs of air hitting against the foil, sounding much like rain drops falling on 
large leaves of plants. 

After several weeks, I walked into the bedroom one day without turning on the light, 
and I saw the foil perforated with literally hundreds of holes in the foil. The holes can 
only be seen when the room is dark and there is daylight outside. The holes ranged 
from pin size to perhaps a forth of an inch diameter; the smaller holes seemed to be 
perfectly round; some of the larger holes were somewhat jagged. Those windows on 
that side of the house face almost due south. My satellite TV dish and satellite internet 
dish stand right outside those windows to pick up the satellite signals from the 
southern sky, a further hint that satellites may have something to do with ESMC. 


I prepared a written complaint to submit to the sheriff’s office about the holes in the 
foil. In the complaint, I was very careful to mention only the electronic stalking 



52 


element, not the mind control element, knowing that any mention of mind control 
would only make me look like a crackpot. Before I had time to print out the complaint, 
the stalkers, who have access to my computer, changed the date from January 14, 
2008 to November 14, 2008 (1 1 months in the future) to make me look crazy. 
Fortunately, in scanning the report before I submitted it, I caught that change in my 
date and corrected it by hand. 

When I drove that same day to the local sheriffs office, I parked in front of the large 
three-storied building. The moment I stepped out of the truck I felt strong vibrations. 

My dog in her portable kennel in the back of my pickup truck also started to shake 
uncontrollably, just as she does when under attack from the electronic stalkers. That 
suggests that the sheriffs office either houses some very sophisticated electronic 
equipment that is manned throughout the day or there is an exceptionally strong 
electromagnetic force in that location. 

I entered the building and found the criminal investigation section. When the duty 
officer in that office asked the nature of my complaint, I told him. Without blinking an 
eye, he told me matter-of-factly, as if he were an electronics expert, that the only way 
stalkers could bother me electronically was in touching me with something like a 
Taser. Instead of telling him that he was full of s--t, as I was inclined to do, I kept quiet 
and insisted on talking with an investigative officer. 

The duty officer’s remark, though impertinent and uninformed, was revealing. He had 
obviously been instructed by higher-ups to give that policy statement to anybody 
complaining of electronic harassment. That means that other citizens in Ouachita 
Parish, Louisiana had previously complained about the same harassment! 

To lend credence to that belief, I confided in a dentist whom I had seen over the years 
about the possibility of a microchip having been implanted in one of my molars. The 
dentist did not appear the least bit surprised, which strongly implies that other patients 
had also told him similar stories. He replied that if I had one it would more likely be 
located in the soft tissue (the gums) rather than the teeth, suggesting that it may have 
been injected with a syringe. The dentist began condemning various government 
actions and government surveillance. I do not know whether he thought that he was 
patronizing a delusional patient or actually believed that the government was covertly 
monitoring the American citizenry. 

The duty officer at the Sheriffs Office assigned a junior parole officer to take my 
complaint, and that officer promised to pass my complaint to the investigative section. 
A few days later an investigative officer, with an assistant, did indeed arrive at my 
house. The lead officer was supposed to be the resident expert on high-tech crime. I 
showed them the holes but did not offer any explanation for them. The officers 
showed little surprise, asked no questions, and made no comments. The perforated 
foil provided forensic evidence; yet, the officer did not ask for a sample for forensic 
examination. I never heard anything else from those deputies. Still more strangely, the 
senior detective received a promotion a few weeks later from sergeant to lieutenant. 



53 


Once again, in February, 2008, I was harassed non-electronically by persons riding 
four-wheelers at one o’clock in the morning in front of my house and shouting. I live at 
the end of a long, obscure, private dirt lane with a field on one side and a pasture on 
the other side, so there was no reason for them to be in that area. Furthermore, my 
house is the only structure on that lane. I prepared a complaint about that incident and 
took it to the sheriffs office later that same day. 

After presenting the second written complaint, the sheriffs office called my son at his 
work place to tell him that the sheriffs office wanted me to undergo a psychiatric 
evaluation. When they called, I was actually on my way back home from visiting my 
son and his family. There was no reason to call my son instead of calling me directly. 
Moreover, I had not given them my son’s name, his place of work, or his telephone 
number. I interpreted their action as a deliberate effort to intimidate me and to suggest 
to my son that I was crazy. 

When I returned home, I visited the sheriff’s office the following morning. They 
threatened to obtain a court order to force me to submit to a psychiatric evaluation. 
That appears to be law enforcement pro forma in cases of electronic assault. 

Although I knew that they could not justify that action, I agreed to the evaluation on 
my own terms, as I knew that the result would probably strengthen my case. I later 
underwent the psychiatric evaluation as well as a good physical examination in 
another city. Both examinations proved me very fit. After my going to much trouble 
and expense in getting the examinations, the sheriff’s office has consistently refused 
my requests for meetings to review those findings. 

At the meeting with sheriff’s office officials prior to my having the psychiatric and 
physical exams, I showed the officers some notes that I had written on electronic 
stalking (no mention of mind control at this point), which I wanted to give to an 
investigative reporter for the local newspaper. In publishing a news story on ESMC, I 
hoped to flush out other victims in the area, as by then I was convinced that there 
were several other targets in the parish. The officer stated somewhat smugly that 
publishing the article would not be a very good idea, as (paraphrased) “investigative 
reporters have a habit of wanting to delve deeper into the matter.” I viewed that as 
meaning that local law enforcement did not want the public to know anything about 
electronic stalking. Once again, the officer’s statement suggested that law 
enforcement knew that other targets in the area were experiencing the same problem 
as I. 

Shortly after that meeting, I got a call one day from an employee in the state-operated 
Elderly Protective Services, an office that I had never heard of. The Sheriff’s Office 
had asked her to get in touch with me and visit me - still another evaluation. I realized 
that her visit might work to my advantage instead of the opposite, so I agreed to her 
visit. The moment she arrived and I greeted her I could see that she was puzzled 
about why she had been asked to see me. I invited her inside and we chatted for a 
few minutes. As she left, she told me candidly that she was confused about the 



54 


request to visit me, as I was more mentally and physically fit than many younger 
people. 

After undergoing the psychiatric and physical exams and still being unable to see 
anyone in the sheriffs office, I sent a certified letter to the state attorney general’s 
office on June 10, 2008, asking that office to investigate my complaints. By this time, I 
had decided that regardless of the almost certain stigma, I was no longer going to 
hide the fact that I was a victim of mind control Thus, I attached a summary of my 
experiences that included the mind control portion . I have both my mailing receipt as 
well as the initialed delivery confirmation from that office. I never heard from that 
office. They did not acknowledge the letter except for initialing the delivery receipt. 

After more than two months had passed since writing the letter to the state attorney 
general without getting an answer, I then wrote to the Public Affairs Division of 
Louisiana State Police for statistics on electronic stalking and mind control, defining 
clearly both terms. That office answered tersely, “We do not have statistics on such 
incidents.” That meant that my complaint, and doubtlessly those by other targets, had 
gone unreported by local law enforcement in its monthly crime statistics report to the 
state office. No surprise there. 

Finally, on February 19, 2009, when another object turned up missing in my house, I 
wrote to the Sheriff of Ouachita Parish, summarizing three different intrusions in my 
house in my absence. I took the letter to the sheriffs office and his secretary stamped 
the date on my copy. I never heard from that authority. Again, no surprise there. 

In my correspondence with other victims, I learned that in case after case they had 
sought out the FBI, state, and local law enforcement for help and had received none. 
Some of those victims even stated that policemen and other law officers later moved 
into houses and apartments near them. In all of my communication, I never found a 
victim whose case was seriously investigated. 

In my case, although an investigator initially came to view the proof of ESMC, that 
visit was simply a formality. They probably came out of curiosity. Moreover, as the 
answer from Public Affairs attests, he never filed a report of his visit. I never heard 
anything else from the Ouachita Parish Sheriffs Office about the ESMC case, and 
that officer and others refused to meet with me afterward. 

Electronic stalking and assault (in this case, on both the body and the mind) are 
crimes in any civilized society. That I could not identify my assailants should not have 
been a factor. Many victims of crime cannot identify their assailants. Watch the “who 
dunnit” programs on TV. In many cases, victims are assaulted without seeing their 
attackers. Although naturally that makes pursuing the assailants more difficult, law 
enforcement is responsible for at least attempting to locate the criminals. In the case 
of ESMC, the victim should only have to describe their attack. They should not have 
to tell law enforcement who is doing it and how it is done . 



55 


Let us review our seventh grade civics. On all three levels of government - national, 
state, and local - there are three branches, the executive, judiciary, and the 
legislative. The legislative branch passes the laws, the judiciary interprets them, and 
the executive enforces them. Law enforcement belongs to the executive branch on all 
three levels. Most of the higher officials in the executive branch, including law 
enforcement on the state and local levels, are elected by the people. Thus, if law 
enforcement is indeed a part of the ESMC conspiracy, they are elected public 
servants using public funding to harass private citizens. In other words, the taxpaying 
victims are not only unprotected by law enforcement but they are also helping to 
finance their own electronic and mind control torture. 

U. S. Intelligence and Law Enforcement Examined 

The stand-back, hands-off position of the FBI and local law enforcement is 
understandable only if one considers that those authorities themselves may be 
involved in electronic assault and mind control activities. Ask yourself the following 
questions. 

(01 ) Who would have the equipment to carry out electronic assault? 

(02) Who would have the knowledge about how to use that equipment for ESMC? 

(03) Who would have a ready opportunity to use the equipment? 

(04) Who can communicate through a network that allows them national coverage? 

(05) Who has the authority to investigate people and obtain their personnel and 
military files? 

(06) Who has the financial resources required to buy the equipment, procure the 
handlers, train those people, and pay them for their services 24/7? 

(07) Who has the technical expertise to train handlers in electronic stalking and mind 
control activities? 

(08) Who has secure facilities where extra-legal records on the targets and 
information gathered on the targets can be kept? 

(09) Who has the authority and funding to send hundreds of investigators into the field 
to conduct interviews with people who know the targets and record those interviews. 

(10) ) Who has the connections to pursue victims from city to city, state to state, and 
country to country as they seek to escape the effects of ESMC? 

(11) Who can best start rumor campaigns and spread misinformation about the 
targets? 

(12) Who can prevent investigations by law enforcement into complaints of ESMC? 

(13) Who can encourage the medical and scientific communities to maintain silence 
on ESMC and psychiatrists to label victims paranoid-schizophrenic without looking 
further into the subject? 

(14) Who can summon the assistance of telephone companies, public utility 
companies, and internet providers in tapping phones and hacking computers of 
victims? 

(15) Who can command the cooperation of the post office and the package delivery 
services into misdirecting and interfering in other ways with the victims’ 
correspondence? 



56 


(16) Who has the human resources to fill the internet with lies, misleading material, 
and deceptive information on electronic stalking and mind control? 

(17) Who has the equipment and the capability of tracking a person within his home or 
any other structure and pinpointing any place on that person’s body? 

(18) Who has the means to encourage neighbors to ostracize a victim in his own 
neighborhood? 

(19) Who has the power to direct the resources of the IRS, DEA, ATF, and other 
agencies on the targets? 

(20) Who has the capability of gaining access to the targets’ financial records and 
credit reports? 

(21 ) Who has the clout to silence Congresspersons, especially the Committee 
Chairpersons, from ordering a national inquiry into widespread and increasing 
allegations of ESMC? 

(22) Who has the capability to garner the cooperation of elements of all ethnic groups 
against a target? 

(23) Who can make certain that no ESMC complaint is submitted on local law 
enforcement’s monthly crime report? 

(24) Who has the influence to keep any mention of ESMC out of local newspapers? 

(25) Who has the authority to issue policy statements denying that electronic assault 
even exists? 

(26) Who has unlimited human resources to use in this manner? 

(27) Who can legally allow or block out frequencies over the air? 

(28) Who can subsidize the rent of policemen and other local law enforcement to rent 
an apartment or house next to yours? 

If you answered “Law Enforcement” to all twenty-eight of those questions, you are 
correct. 

Electronic stalking and mind control simply cannot exist without the knowledge of the 
FBI and other Federal intelligence gathering agencies. Period. That hints of a vast 
and widespread conspiracy that must necessarily include local law enforcement. That 
conspiracy is secret, well organized, and thoroughly implemented. It is highly possible 
that conspirators may include legally constituted and outwardly legitimate groups. If 
that is correct, the FBI, DIA, DOD, CIA, and other American intelligence units would 
have to train those selected groups, provide them the equipment and know-how to 
use it, and train and advise them. 

A victim’s only recourse is to inform law enforcement of the crime. Those authorities 
are expected to investigate and assist the victim. If law enforcement is the perpetrator, 
to whom else can a victim turn for help? 

Electronic Stalking Versus Mind Control 

Four main points stand out: (1) Electronic stalking and mind control pervades the 
United States of America, targeting victims that represent the make-up of the entire 
population; (2) Conspiracy, deception, and secrecy are key elements in those 



57 


activities; (3) Perpetrators of that electronic stalking and mind control conspiracy 
operate on national, state, and local levels; (4) Many of those conspiracies operate 
with the acquiescence and under the protection of law enforcement on all levels of 
government. 

Ordinary electronic stalking can be carried out by many people and groups operating 
near the victims and using home-made or altered devices and equipment that can be 
easily purchased. Mind control, on the other hand, is quite another activity, which 
requires high-tech equipment, a great deal of organization, intensive training, utter 
secrecy, and the ability to operate from afar. Amateurs can carry out electronic 
stalking; only highly trained technicians can carry out mind control. 

The Role of Jails and Prisons in Electronic Torture and Mind Control 

Experiments with electronic torture and mind control in so-called correctional facilities 
probably began back in the 1960’s and 1970’s. David James Fratus, a prisoner in the 
Utah State Prison in Draper, Utah, wrote of his experiences with ESMC in that facility 
in a 1988 letter. I include below some excerpts from that very long and descriptive 
letter. 

“I began to receive, or hear, high frequency tones in my ears. Like the test pattern on a TV set. The volume or 
intensity of these frequencies is adjustable and some are so high and piercing that they've literally had me climbing 
the walls. You cannot imagine what it has been like confined to a cell 24 hours a day for almost a rear [year] now, 
being brain blasted by high frequency impulses--no respite, no place to hide, and having not the lightest notion 
what was going on. 

For the climax in this series of weird events, I began to hear voices in my ears. Voices that change pitch and 
timbre in contrast from being a cartoonish high and squeaky, descending through the octaves, including everything 
from sinister Darth Vadorish to basically normal characteristics. The reception of these voices into my inner ears is 
as vivid as though I were listening to a set of stereo headphones, and they are able to mix, match, and blend them 
in conjunction with the frequency tones creating a raucous cacophony of audio discord that disheartens the soul. 

Now for the clincher. The various effects of this device have been progressively increased throughout this eleven- 
month onslaught, finally arriving at full potential with the end result being that I am now having my brain monitored 
by an omnipotent computerized mind reading or scanning machine of some sort. No hoax, no illusion to what I'm 
experiencing. These people have devised or acquired a specialized unit that reads absolutely everything-physical 
as well as mental functions, and are able to cause severe impairments and dysfunctions via this remote-control 
scanning device. 

This scheme of sleep deprivation, headaches, and audio torments is relentless and being used to break down my 
resistance and wear me to a mental frazzle, permitting no mental privacy, berating and picking my thoughts apart, 
and attacking my mind with an insidious tirade of sickening innuendo and threats. They are going into my 
subconscious, or memory bank, bringing forth unpleasant memories long ago forgotten, and I am being punished 
for past as well as present indiscretions. I can think of anything from the past-- a friend or situation from 30 years 
ago for instance, and the voices will provide names and particulars. I have repeatedly tested and attempted to trick 
them on this. No way. They have better access to what's in my head with this nefarious invention than I do. 

I can converse with my antagonists merely by thinking what I wish to say.... and I welcome you to the Twilight 
Zone!! How the hell is this being done?? They are using those frequency impulses to perpetrate some very vicious 
maltreatment on me. With the apparent ease of manipulating a keyboard, they can, with a flick of the switch, strip 
me of all energy and motivation to where I'm forced to lie on my bunk and stare at the wall like a zombie. I've been 
left in this state for weeks at a time— literally chained to my bed without the actual use of physical restraints, having 
not the energy to walk back and forth in my cell even a few times. For almost the entire eleven months I have 
continuously been made to feel low down and chronically depressed. 


58 


It is inconceivable to me that the technology of this awesome device can be unique and possessed solely by the 
State of Utah, but I may very well be wrong. When I first entered the prison in May, 1986, one of the psychologists 
who conducted my initial classification interview inquired as to whether I had ever heard "voices." That seems to 
be the key word around here. . . .The proficiency of the apparatus I'm dealing with is sophisticated far beyond 
anything scientists had apparently imagined in use at that time. I have since heard many references made to 
people hearing "voices" by both inmates and staff, which would indicate that these people were in possession of, 
and employing this technology at least that far back. This is what prompts me to wonder how they could have had 
such an innovative piece of equipment in use, operating with apparent perfection of technique, without the 
scientific and medical community in general being aware of it. Quite a puzzle. 

At least two inmates that I know of have been badgered to the point of having attempted suicide as a result of this 
mental torment, and something stinks to the high heavens here! All of the staff, as well as a number of inmates, 
are aware of what is happening, so I can't fathom how it can remain, or even at this time, be a kept and closed 
secret human nature being what it is. They [prison authorities and guards] are so very smug and secure in the 
belief that they cannot be brought to account for these blatantly illegal acts due to their well rehearsed methods of 
official denial, isolation, and absence of witnesses, bogus psychiatric evaluations, and of course, the fact that this 
mental torment is being accomplished by a faceless machine, operated by anonymous antagonists from an 
unknown location and distance." 


What happened to Fratus in the Utah prison represents the most heinous crime 
against humanity. In another case, the TV program “48 Hours” on August 16, 2008, 
told about Florida playboy Fred Kretsmer’s spending eight months in a California 
prison and later hearing “voices.” Kretsmer later murdered a woman. Did the voices 
that he heard urge him to kill? Several victims with whom I corresponded who also 
hear voices had served time in prison. Thus, it appears that psychological torture in 
prisons is widespread. 

At least six or eight of my correspondents have served jail or prison time. All of them 
were subjected to electronic torture and mind control in those facilities. They believe 
that they were also targeted there. 

However, only the most naive, uninformed persons will believe that state prisons 
exercise a monopoly over electronic torture devices and methods and mind control. 
Other elements of law enforcement must know about them. Moreover, how did those 
prisons acquire that technology in the first place? 

Why use electronic torture and mind control on prisoners who are already 
incarcerated and removed from society? Besides the sick satisfaction that 
perpetrators get out of torturing helpless inmates, they may also be accomplices in 
carrying out the same ESMC methods on the American public. Keep in mind that 
Fratus wrote his letter twenty years ago. Imagine how much more sophisticated the 
equipment, the software, and the mind control techniques have gotten in the last two 
decades. And imagine how the spread of that evil has proliferated in the meantime. 

Psychiatrists and Other Professionals 

ESMC could not have been developed without input from psychologists, psychiatrists, 
electronic and aerodynamic engineers, very highly trained computer programmers 
and technicians, probably physicists, chemists, and pharmacists, mind control and 
interrogation experts, i.e., the intelligence community, and others. Nor could it have 
been developed without the knowledge of the FBI or the blessings of the National 


59 


Security Agency. It is surprising that at least one of the scientists or government 
officials involved in planning the original ESMC techniques has not spoken out and 
revealed the sordid secret. However, the fact that participating in ESMC makes them 
criminals and subject to imprisonment is probably sufficient persuasion to keep them 
quiet. In addition, they probably fear they will also become victims of fatal “accidents” 
and other mysterious deaths if they talk to authorities or to the press. 

One of the aims of the assailants is to discredit the target by making him look crazy, 
and they do indeed cause anxiety and other psychological problems in the target that 
drive him to a doctor. Unfortunately, the medical community either knowingly supports 
the perpetrators or plays right into their hands unwittingly. The family doctor will 
usually refer the target to a psychiatrist, who will then diagnose him as schizophrenic. 
The handlers know that once a target has seen a psychiatrist that whatever the target 
later says will be viewed with skepticism. 

Do not believe for a second that psychiatrists do not know about electronic stalking 
and mind control. About a year after I began receiving the continual effects of ESMC, I 
visited the same psychiatrist whom I had contacted years earlier when I suffered from 
anxiety induced by the handlers. The psychiatrist had retired from the military and had 
opened a private practice a few years before my first visit. I left him a summary of my 
experiences and my thoughts about them. He read that summary, and the content did 
not at all surprise him, nor did he tell me that I was paranoid schizophrenic. (He had 
much earlier told me that I most certainly was not mentally ill.) Instead, he later called 
to encourage me to write a fictional book about those occurrences. I told him I would 
consider doing that but it would not be labeled fiction. 

Not all psychiatrists are involved in the ESMC conspiracy; they are simply defending 
their field of study. Figure it out. If a psychiatrist actually believes that a patient is a 
victim of ESMC, he loses that patient, for a psychiatrist can only treat real problems 
with the victim’s brain, not what the stalkers do to his brain. To keep the patient, the 
psychiatrist is compelled to call the victim’s condition paranoia, schizophrenia, or 
dementia and then prescribe mind-altering drugs, which only compound the stalkers’ 
effects. 

Often psychiatrists will recommend extended treatment in a psychiatric facility for 
victims who “hear voices.” That treatment is sometimes provided in the American 
Gulag, or the nearest insane asylum, for few targets can afford private clinics. Several 
victims with whom I corresponded had been involuntarily admitted to mental 
institutions because of their symptoms despite not posing a threat to anyone or to 
themselves. They always came out of those institutions worse than when they went 
in. 

In attempting to defend themselves from unseen and unknown objects from an 
unseen force, targets do indeed often act in bizarre manners. Many targets are afraid 
to go to dentists for fear that the dentists will implant or inject microchips in their teeth 
and gums. As a consequence, their teeth decay and become a physical problem. 


60 


Other targets will not take shots or inoculations and thus subject themselves to fatal 
diseases. Still other targets will not discuss sensitive matters in front of TVs because 
they feel that the TVs are used to watch them. In my case, I built a wall of clear vinyl 
panels around and over my computer, leaving only the front open, believing that the 
plastic wall might keep the handlers from accessing my PC. Still other targets place 
aluminum foil over their windows to ward off the directed energy waves or whatever 
they may turn out to be. Those acts, however, do not mean that they are crazy. 

ESMC Erodes Trust in Government and Democracy 

I resisted for years the notion that my own government might have anything to do with 
my becoming a victim of electronic stalking and mind control; yet, overwhelming 
circumstantial evidence and logic tell me that U. S. law enforcement on the Federal 
level is either directly involved in electronic harassment and mind control or knows the 
identity of the assailants and either refuses to investigate them or actually protects 
them. Many Tl correspondents trace their ESMC to the early 2000’s, which coincides 
with the Bush administration (2000-2008). The Patriot Act not only gives U. S. law 
enforcement carte blanche to monitor American citizens but also excludes those 
officers from prosecution for the monitoring. 

I used to be the type American whose eyes welled with tears whenever he heard the 
Star Spangled Banner. I was raised to revere the government. Moreover, I served in 
the U. S. Armed Forces Reserves and spent years working with the government. My 
ancestors helped found the British colonies, and my ancestors and kinsmen fought in 
the American Revolution. However, after my experiences with ESMC, I have 
developed a very strong distrust of my government and the executive branch in 
particular. I believe that it is patently clear that the FBI, the U. S. intelligence 
community, and law enforcement on every level either take part in electronic stalking 
and mind control operation, cooperate with the perpetrators, or cover for the 
perpetrators. 

I kept quiet for over two years after I discovered that I was a target of electronic 
harassment and mind control, as I knew that most people would not only doubt my 
accounts of ESMC but also my sanity. Then I realized that the perpetrators of that evil 
counted on my remaining silent. In fact, targets’ reluctance to talk about what is 
happening to them has set back for years our attempts to expose ESMC and the 
people behind it. Thus, I chose to reveal to the world my experiences as a victim of 
electronic stalking and particularly of mind control. I would urge other targets to do 
likewise, regardless of the stigma that they will almost certainly encounter. 

In the silent telepathic manner in which the perverts and I communicate, I tell the 
handlers that nothing lasts forever, that times are changing and that they are “going 
down.” The sickos are convinced that the establishment will continue to protect them. 
After all, they have engaged in the sordid practice of ESMC for decades. Once one of 
my handlers told me (subliminally), “I guarantee you that we are protected.” 


61 


Nevertheless, eventually the sheer growing numbers of complainants will force law 
enforcement to follow the laws that they swore to uphold and adhere to the principles 
of the Constitution that they swore to defend. The general public is becoming more 
aware of and informed about ESMC, and targets are beginning to emerge from hiding 
to insist on law enforcement investigations. More victims are beginning to network on 
the internet. Until law enforcement acts, I invite other victims of electronic stalking and 
mind control and other concerned Americans to join me in the war against the 
demented, evil ESMC torturers and sociopaths. 

The stability of the American government lies in grave danger. If the perpetrators of 
ESMC are from foreign countries and are attempting to create American dissidents, 
they have succeeded. If the perpetrators are rogue groups within the U. S. intelligence 
community and law enforcement, they have succeeded. If the perpetrators are 
domestic terrorists or vigilante groups, they have succeeded. Thousands of American 
targets of electronic harassment and mind control today distrust their government and 
no longer feel any patriotism toward that government. 

I am a social scientist with many years of experience in performing research. When I 
analyze situations, I look for scientific explanations. Yet, due to the secrecy involved 
in ESMC, it cannot be explained scientifically. Nevertheless, thousands of victims with 
similar symptoms delivered by remote by unknown forces know the reality of their 
circumstances. They await an explanation and a resolution. 

The Future of ESMC 

I suspect that in years to come we will discover that many mass murderers and 
parents who kill their children are victims of mind control. Two such murderers have 
made news in the last few years: Andrea Yates, who drowned all five of her children, 
and Leanna Laney, who killed two of her young sons and left a third one incapacitated 
for life. Both women were believed to be good, caring, and devoted mothers. Both 
women heard inner voices commanding them to commit infanticide. One of the 
women said the voice was that of the devil; the other one, that it was the voice of God. 
The husband of one of the women worked with NASA. I believe that the voices were 
devils, but human devils. In addition, killers like the D.C. snipers, John Allen 
Mohammed and Lee Boyd Malvo, show markings of people under the influence of 
mind control perverts. In addition, the various school massacres may have been 
caused by perverted handlers whispering instructions into the student assailants’ 
brains. 

I foresee the day when groups of professional extortionists, blackmailers, and 
swindlers learn the secret of ESMC and turn it into a money-making scheme. They 
will do that by selecting targets who lead comfortable life styles, torturing them with 
their electronic and mind control techniques, and then making deals with the targets to 
stop the ESMC. They will also make money by offering their services to people who 
want to harm somebody whom they do not like. For a price, the pervs will “hook” that 
person, torture him, and provide the payer with videos to prove it. 



62 


Moreover, they can later approach the victim and ask for a large sum of money to 
“release” him. Thus, the assailants will make money playing both sides. My handlers 
have demanded from me $10,000 one time, $15,000 another time, and $30,000 still 
another time. Of course, I believe that in my case it is plain deception. The assailants 
will also sell information about other people obtained from targets. Handlers learn 
from targets the combinations to safes, telephone numbers of many people, financial 
records of others, the weaknesses and vices of others, and much other information 
that, in the wrong hands, could result in great personal losses not only for the targets 
but also from people with whom they associate. 

I am very defiant of the perverts, and I go on with my life despite their electronic and 
mind control effects and the resulting annoyances and inconveniences. The handlers 
recognize that although they can bother me, they cannot beat me down. On two 
occasions, the handlers invited me to join them. I laughed, called them a few choice 
names, and told them, “Not in 500,000,000 years!!!!” They will very often test the 
target in that manner. That is pure deception. 

Over the last few months, the handlers have “lasered” the outside of my right nostril. I 
can feel a distinct tingling in that location that is anything but natural. First a very 
sensitive brown spot appeared there and then a small indentation. More recently, I 
have noticed a white spot about a quarter of an inch in diameter on my chin, where 
the tingling also occurs. Like my nose and ears, that spot becomes covered with a 
film, except that instead of feeling crusty, it feels soft. The hairs of my beard are 
thicker and much more numerous in that small area. The handlers may be trying to 
cause skin cancer or melanoma. The handlers know that I use smokeless tobacco, 
and they want the cancer to appear to be tobacco-related. 

Unless ESMC is stopped very soon, it will proliferate and we will see an alarming rise 
in the misuse of the technology used for electronic torture and mind control in other 
areas: racial and ethnic groups targeting persons in other racial and ethnic groups; 
religious groups targeting those in opposing religious groups or atheists and 
agnostics; rightist nuts targeting homosexuals, lesbians, and others following 
alternative life styles; the wealthy targeting people whom they single out, perhaps for 
the sport of it and the voyeurism involved; gangs targeting those in rival gangs; 
mobsters targeting young women and boys for prostitution; drug lords targeting 
people to turn them into drug addicts; politicians targeting political enemies; social 
purist psychos targeting for extinction the handicapped and others who do not 
conform to their concept of societal perfection; and world leaders targeting other world 
leaders. The more the practice of electronic torture and mind control proliferates, the 
more out of control it becomes. It promises to become the Armageddon that many 
people believe will eventually occur. 


The Silent Massacre 



63 


When four demonstrating students at Kent State, Ohio were killed and nine wounded 
by National Guard troops on May 4, 1970, that incident created such international 
outrage that an incident like that will never happen again in the United States. 
Nevertheless, today a much more cowardly, widespread, and inhuman massacre 
occurs every day to a growing number of victims in an electronic and neurological 
onslaught. The Kent State students could at least see and face the troops’ weapons; 
victims today stand helpless against a lethal unseen force cloaked in secrecy and 
delivered by remote. 

Likewise, victims of today’s silent massacre do not have an opportunity either to 
prosecute their attackers or face a court of law in which they might be able to defend 
themselves. They simply die a very slow death at the hand of unseen executioners. 
Most targets are plain middle-class Americans of all races, ethnicities, colors, 
genders, religious and political beliefs, philosophies, and life styles. Many of them, 
however, have somehow bucked the system or have refused or failed to fit into the 
socio-economic-Judeo-Christian structure. 

An immigrant from a former Communist country recently wrote me about her 
electronic torture and mind control ordeal in the United States. Here is what she says 
in her own words: “It makes me mad, especially, because I came from the former 
communist country and didn't expect such things going on in here. This is a very, 
very big disappointment. Now I do not believe in democracy any more, and, as you, I 
guess that the government is involved in that too. I do know my abusers: they are my 
neighbours; There is also, a coordinator, as a former law enforcement officer living 
just opposite of my house. It is exactly as you wrote in your paper.” 

In a December 30, 2008 issue of Science and Technology, journalist Vic Livingston 
writes that a coalition of law enforcement and vigilante citizen operatives lies behind 
the attacks. He suggests that the coalition is funded by taxpayers’ money and 
monitored by agents who probably fall within the Department of Homeland Security’s 
jurisdiction. The author’s electronic and mind control torture, mine, and those of many 
others first came to light during the George W. Bush administration, 2001-2009. 
Although my surveillance dates back many years, the electronic and mind control 
torture did not surface until 2005. In my case, the date coincides with Michael 
Chernoff’s appointment as Secretary of Homeland Security. Chernoff, son of a rabbi, 
has very strong connections to Israel, pro-Israel PACs, and pro-Israel so-called 
Christian Fundamentalists in the United States. 

Today, instead of shooting its citizens, elements protected by the government slowly 
tortures them to death by remote with directed energy and neurological weaponry that 
conveniently remains both unknown and unseen. In 1989, the United States 
Government reacted strongly to China’s attack on unarmed dissidents in Tiananmen 
Square. Yet, the United States’ silent massacre eclipses a thousand-fold the 
Tiananmen Square shootings, and it is carried out daily with complete national and 
international impunity. 



64 


Letter to the FBI 

On the premise that certain renegade factions of the FBI, not the entire FBI, were 
involved in the electronic torture and mind control on Americans, I wrote to the FBI. 
Here is the letter. 


Public Relations & Information 
Federal Bureau of Investigation 
935 Pennsylvania Ave, NW 
Washington, DC 20535 

Subject: Electronic Stalking and Mind Control Activities Performed on Americans 
Dear Sirs: 

Attached is an article on the above subject that I wrote under a pseudonym for online readers. In that paper, I 
pointedly state that the FBI and other U. S. intelligence services must necessarily know about electronic assault 
and mind control, yet they do nothing to halt that practice. Further, I write that FBI failure to take action against 
those domestic terrorists logically leads one to believe that the Bureau condones and perhaps even collaborates 
with those criminals. 

I would appreciate receiving the FBI's responses to the following questions. 

-- Does the FBI officially acknowledge that electronic stalking and mind control, particularly the latter, are carried 
out by remote on selected targets in the United States of America? 

-- If so, does the FBI know how those electronic and mind control effects are carried out on those victims? 

-- If so, what action is the FBI pursuing to locate and apprehend the perpetrators? 

-- If so, why does the FBI not inform local and state law enforcement and the general public of electronic assault 
and mind control being conducted on citizens and residents of the United States? 

Thank you. 

I sent the above letter by USPS Priority Mail on April 14, 2009 and got a delivery 
confirmation receipt. When I later tracked the number on the receipt, the delivery 
status showed that the package arrived in Shreveport on January 2, 2002 . In other 
words, the FBI field office in Shreveport intercepted the package and would not 
acknowledge the date. The letter was supposedly picked up in Washington, DC on 
April 20, almost a week later. Priority mail is supposedly delivered in a three or four 
day period. 

Somebody, I believe pro-Israel employees of the FBI, monitors my PC and taps my 
phone, so that person or group already knew that I was sending the letter. Thus, the 
Shreveport FBI field office intercepted the letter to add material intended for the FBI in 
Washington, DC. The obvious intent was to discredit me and make me appear to be 
mentally unsound. 

As I now write (May 25, 2009), it has been almost five weeks since mailing the letter. I 
suspect that no answer will be forthcoming. 


What Targets Can Do 


65 


All targeted individuals are subjected to a barrage of criminal acts, some of which they 
may not be fully aware. If targets are true TIs, their phones WILL be tapped, their 
computers WILL be hacked, and their mail WILL be monitored. What can victims do to 
defend themselves, halt electronic stalking and mind control activities, apprehend the 
cowardly perverts who carry it out, and punish them and their accomplices? 

— Remember that the perpetrators of your ESMC are the criminals, not you. Your 
total loss of privacy, even in the case of your most intimate thoughts, is frustrating. 
However, keep in mind that whatever the criminals know about you and your 
thoughts, they are not going to publish them in the New York Times. I continually 
laugh at my perverted handlers and tell them that I really don’t care what they see, 
hear, know, or think that they know, or do. I remind them that although they can 
temporarily play with my mind, they cannot own it. I am the master of both my 
mind and my body. 

— Remain positive. Despite the unsettling nature of the ESMC activities, targets must 
make a special effort to maintain a positive attitude, especially when around 
others. Remember that the perpetrators of ESMC are trying to ruin your lives. Do 
not let them. I start each day by stating how great the day is, whether it is rainy or 
sunny or cold or hot. 

-- Maintain your health. This is very important, as the perpetrators of the ESMC seek 
to make you a couch potato. They will whisper to your subconscious to binge eat, 
to watch more TV than usual, and to eat the wrong kinds of food. They will also 
whisper to you that you have no energy, that you feel extremely tired, and that you 
must rest. They will discourage you from making improvements in and around your 
home. Despite your listless feelings, go about your activities and make a point of 
getting plenty of exercise. A clear correlation exists between physical health and 
mental health. Defy the pervs. Make a concentrated effort not only to maintain 
your health but even to strengthen it. 

— Do not discuss your ESMC harassment with every friend, family member, and 
acquaintance. They simply do not understand and cannot understand. However, if 
you have a perceptive, intelligent, trusted friend or family member who is open 
minded enough to believe hard-to-believe circumstances, let that person know 
what is happening. A confidant who truly believes you can be very supportive. 

— Do NOT visit a psychiatrist. The ESMC assailants want targets to go to 
psychiatrists, knowing that the doctors will diagnose targets as schizophrenic or 
paranoid. Once targets see a psychiatrist, their credibility is compromised. 

The evil perverted assailants will do everything to convince targets that they are 
mentally incompetent, including continually whispering to them “you are crazy.” 
Indeed, the handlers’ activities will often cause targets to exhibit the very 
symptoms that psychiatrists associate with schizophrenic and paranoia in 
attempting to defend themselves against forces that they cannot see and do not 



66 


understand. However, the general public is increasingly becoming aware of 
ESMC, and friends and family members of targets who have been designated 
“demented” are beginning to see that those targets are not truly mentally unstable. 
In only a few more years, the psychiatric community will have to redefine 
schizophrenia, paranoia, and other mental disorders because of the unnatural 
electronic and mind control assaults that cause those symptoms. This will not 
occur, however, without a great deal of pressure from the outside, as psychiatrists 
have no way of treating remote-induced symptoms of schizophrenia and paranoia 
resulting from ESMC. 

Resist any effort on the part of law enforcement to make you submit to a 
psychiatric evaluation. In our system of justice, targets should not have to prove 
that they are sane. Indeed, the burden of proof falls on law enforcement to prove 
that targets are mentally deranged. That is why authorities want to send you to a 
psychiatrist whom they customarily use and can depend on to render a verdict that 
is in keeping with their accusations. 

Know that mental incompetence cannot be proved by your words and actions 
alone, and that the state and local law enforcement have no power to act unless 
your actions have the potential of harming yourself and others. If authorities do 
insist on your seeing a shrink, demand that the psychiatrist also possess 
knowledge of directed energy, electrical and radio theory, high tech 
communications, organized stalking, and even electronic stalking and mind 
control. Notwithstanding, targets should make every effort NOT to look insane by 
falling into the handlers’ well laid traps. Despite your frustrations and the handlers’ 
whisperings, do not act irrationally. 

Make special efforts to stay in contact with family members and friends, for the 
handlers concentrate on isolating you from society. Maintaining contact will not be 
easy. The handlers will have hacked your computer and tapped your phone lines. I 
recently got a call on my cell phone that showed the phone number of good 
friends, a man and woman couple. The person who called pretended to be the 
woman; however, the female speaker spoke with an accent and the voice was 
most certainly not that of my friend. Moreover, she ended with an exaggerated 
“good-byeeeeee,” which would have been totally out of character for my friend. 
That meant that the caller had used some means to make the call through my 
friends' account at the communications provider; otherwise, the real number of the 
impostor would have showed on my phone. The caller probably wanted me to say 
something later to my friends about the call to make me appear crazy. I did not. 

The handlers will cause problems with your computer and will intercept your 
emails to others and also those that come from others. They will also suddenly cut 
off conversations by phone, create static that makes talking impossible, cause 
your voice to echo (only you will be able to hear those echoes), and sometimes 
divert the calls so that their accomplices answer. Manipulation of your 



67 


communications system is ultra important to the perverts’ plan to isolate and 
frustrate you. 

Record the handlers’ actions and your thoughts about them. Those thoughts 
will change over time as you learn increasingly more about your handlers. Their 
ESMC tactics will also change, becoming increasingly more complex as they go 
through their repertory of capabilities. It is very important for you to describe the 
perverts’ electronic and mind control actions accurately and to record in great 
detail the sensations that you feel and your reactions to those actions. Record the 
day, date, and hour that particular actions occur. You may see a pattern in the 
timing. Their actions will normally occur in the evening while you sleep, as you 
present an immobile target for them and there is less electromagnetic atmospheric 
interference. Keep a flashlight, watch, notepad, and pen underneath your pillow or 
nearby to record those actions. 

Be observant. Watch people, places, and objects carefully. Record your reactions 
when you see anything that looks even slightly odd. Be careful not to set yourself 
up for the handlers’ electronic and mind control activities. Usually ESMC leaves no 
evidence. The handlers, of course, count on your not having proof. Videotape 
anything that happens out of the ordinary: blinking lights, anomalies in your emails, 
etc. Record any unusual sounds: loud noises that occur in or around the house, 
etc. 

Remember precedents. Think back over previous events and actions. You had to 
have been targeted at some point in time. By recalling people, occasions, and 
incidents, you will probably get a very good idea about when, by whom, and even 
how you were targeted. Particularly think about any medical procedures, shots, 
and inoculations that you had prior to your electronic stalking and mind control 
experiences. 

Thwart the efforts of the handlers and defy them. As time goes on, you will see 
that certain actions on your part affect the capabilities of the handlers. You will 
also learn things that annoy the handlers. I enjoy singing monotonous ditties and 
repeating a phrase or a sentence for hours at a time (silently, through thought) as I 
work and putter. Laugh at your handlers and try to make their lives as miserable 
as they attempt to make yours. 

Stay alert. The handlers will attempt to make you do irrational things by whispering 
instructions and suggestions into your brains. Know this. Give much thought to 
your actions because of that. Remember that one of the major objectives of the 
handlers is to make you look crazy. Be very careful of their deception. 

Work to change the narrow mindset of the medical community about ESMC. I am 
quite certain that at least some psychiatrists recognize the reality of ESMC. 



68 


-- Submit written complaints to local law enforcement. Get the complete name of the 
officer to whom you submit your report. It is very important that the reports be 
presented in writing so that YOU can word the complaint like you wish. Otherwise, 
the person with whom you are talking will write it the way he wants to, probably 
noting that you are nuts. Ask the officer to whom you submit your complaint to sign 
it. Others have done this and the officers have refused. If the officer refuses to 
sign, record that in your notes and let him see you doing it. Your complaints will 
probably never be entered by law enforcement in their crime statistics. Mine were 
not and neither were those of other targets with whom I have corresponded. Law 
enforcement wants no record of your complaints about ESMC. 

-- Contact your Representatives and Senators in writing. Petitions are meaningless. 
Write individual letters. It is important that your correspondence be done in writing 
(emails or letters), as their employees may include an accomplice “plant” who will 
not record and advise higher-up authorities of telephone calls. This will of course 
reveal your real name. It is time for victims to stop hiding and let the public know 
what is actually going on in this country. Our reluctance to do so has allowed 
electronic torture and mind control to go unchallenged probably for decades. 

In addition, send copies of your letters to local and state officials, particularly the 
sheriffs office and the attorney general’s office. Do not expect answers or 
acknowledgements of receipt. Unless overwhelming pressure is laid on the backs 
of leadership, nothing will be done. Congresspersons, themselves being protected, 
are probably blithely unaware of electronic stalking and mind control and the 
possibility of national and local law enforcement in that activity. However, they 
cannot ignore thousands of letters of complaint. There is strength in numbers, and 
the number of victims is growing every day. 

— Seek out other victims of ESMC and network with those victims in comparing your 
symptoms, your thoughts, and information that you have found on ESMC. That 
organization can also become a meaningful support system for you. In the United 
States, Derrick C. Robinson, a Tl and also a U. S. Armed Forces veteran, heads a 
pro-active organization called Freedom from Covert Harassment and Surveillance 
(FFCHS) whose address is info@freedomfchs.com . 

Electronic torture and mind control have been employed for decades. Why have they 
not been curtailed? Here is why: (1 ) Targets have suffered in silence. Only with the 
advent of the internet have targets begun to perform research and reach out to other 
victims. Most of that communication has transpired during the last ten years or less. 
The internet is the last bastion of communication freedom. The powerbrokers have 
not yet contrived a way to limit and control its use. (2) Targets have wasted too much 
time in complaining to each other and have gotten bogged down in self-pity. That 
does not at all mean that we should stop supporting and communicating with each 
other; yet, that should not be an end in itself. Targets should become activists instead 
of habitual complainers. 


69 


(3) Targets have depended on law enforcement, national government, and 
international bodies to “investigate” and stop the electronic torture and mind control. 
They are correct is doing so; however, only those agencies of the government that are 
most likely to engage in ESMC or aid the perpetrators or allow them free rein in 
operating have the necessary expertise to “investigate.” 

A Call to Action 

I suggest that what needs to be done is the following: Stop petitioning the 
government, stop exchanging horror stories, and stop the backbiting and sniping 
among targets, and instead gather a group of scientists and experts whose purpose is 
to study the targets’ stories, their symptoms, and the devices known to exist that could 
cause those symptoms by remote . Such a scientific study will lend credence to the 
topic of electronic torture and mind control that targets themselves lack. The study 
group should consist of an electronics expert, an aerodynamic engineer, a chemist, a 
physicist, a psychiatrist, an acoustics engineer hypnotist, a computer programming 
specialist, a crime investigative expert, a communications specialist who will know the 
workings of major phone and internet providers, and perhaps others. Assembling 
such a group will require much work as most of those persons named are skeptics. As 
mentioned earlier, the perpetrators very carefully avoid targeting scientists, doctors, 
and other technical personnel to discourage discoveries of their means and methods. 

What can targets do to aid in the development of a study group? (1 ) Targets can 
identify scientists, doctors, and other people with special research skills and who 
either believe that electronic torture and mind control exists or are open minded about 
that possibility. Those people are out there. We simply need to locate them and enlist 
their help. (2) Organizations that represent targets can begin a special fund to finance 
the study. With the internet, actual meetings may not be necessary. They can network 
using the internet. If targets can identify the right people, those persons will not likely 
charge for their time and services in conducting research. The only cost may be in 
consolidating and publishing the resulting data. That report can then be sent to all 435 
Congresspersons as well as major national and state government officials. 

(3) Petitions achieve little if anything. Instead of petitioning the government to 
“investigate” electronic assault and mind control, targets should flood the offices of 
elected officials with letters and emails of complaints to create awareness and let 
them know the extent of the problem. The letters should perhaps be directed to 
selected Congresspersons. Each target should write to each of those people. Those 
elected officials will ignore a few letters; however, they cannot ignore hundreds of 
such letters. Once Congress is made aware, it will determine the next step to be 
taken. (4) Targets can prepare narratives of their symptoms and particular situations, 
which the group will be able to study for commonalities and clues. Try to emphasize 
the effects instead of guessing at the causes. (5) Targets can identify extremist 
groups nationally and locally that could have motives for conducting electronic torture 
and mind control assaults on them. Watch the newspapers, listen to news broadcasts, 
and keep your ears open to spot those criminal “vigilante” groups. (6) Join in class 




70 


action suits against the government, particularly if you have hard proof or can produce 
a paper trail showing the probability of targeting. 

Civil Defiance and Creating Awareness 

Every target must become an activist. Not to do so subjects him for the remainder of 
his life to unending and increasingly violent treatment by remote by a yet unknown 
device/method conducted by unknown criminals. Law enforcement already knows 
about the plight of targets - and does nothing. The FBI and other national intelligence 
agencies already know about the plight of targets - and do nothing. Thus, targets 
must act defiantly to expose the evil of electronic assault and mind control to the 
general American public. 

Here are some suggestions: (1) Place messages on large billboards along highways 
and on your lawns for the public to view. They may think that you are crazy, but, hey, 
what else is new! (2) Under the signature blank on your checks and other papers, put 
John Q. Public, Target of Electronic Assault and Mind Control (or Target of Organized 
Stalking). (3) Write a succinct account of your electronic assault and mind control 
(make sure that the grammar is correct and that it is well written), print fliers, and hand 
out those fliers to businesses, people on the street, and people in your neighborhood. 
Keep several fliers in your purse or briefcase to distribute when you see an 
opportunity. (4) Place ads in local newspapers that you are a victim of electronic 
stalking (the mind control is optional) and that local law enforcement has done nothing 
to attempt to discover the perpetrators. (5) Buy postage stamps with the American 
flag or the liberty bell and put them on envelopes upside down to indicate that you are 
a target and you are denied your freedom. (6) Join class action suits against law 
enforcement and other defendants if you have credible evidence of your harassment. 
Readers will probably have other ideas about informing the public. 

In March, 2009, I put my own advice into action by preparing, printing, and distributing 
a flier about electronic assault. I intentionally did not mention the mind control portion, 
as readers in my area simply would not understand at this point. I also printed copies 
of the FFCHS flier and distributed it. Here is my flier. 


SPEAK OUT AGAINST ORGANIZED STALKING 


Most people get the idea that stalking is performed by a lone individual on another lone individual. While 
that is often true, stalking is also carried out by organized groups or gangs against individuals. That criminal 
activity is being practiced in Louisiana and right here in Ouachita Parish with complete immunity. 

Stalkers consist of several or many accomplices who band together to harass an individual through 
spreading vicious rumors or giving out personal information, making wrong number telephone calls and actually 
tapping the victim’s phone, hacking his computer, vandalizing his property, illegally entering his house in his 
absence, sabotaging his vehicle and equipment, and even causing vehicular and other accidents. Those attackers 
are careful to conceal their identities. 

Today’s technology has lent organized stalkers the use of remote-operated equipment to strike the victim 
from afar. The perpetrators can now use those devices to cause these symptoms: electrical-like jolts; chronic 
fatigue; sleep deprivation; cramping (usually the calves of the legs); violent tremors; burns, sores, and abrasions 




71 


on the skin; pin-like pricks on any area of the body; extreme itching; migraine headaches; abnormally fast heart 
beat, ringing in the ears (tinnitus); and many others, including cancer. Distance provides the attackers anonymity. 

Local law enforcement is unresponsive to complaints of electronic assault using remote instruments. Two 
deputies from the Ouachita Parish Sheriff’s Office visited a citizen at his request to view tangible proof of the 
effects of remote electronic attacks. The deputies gave the evidence only a cursory examination, did not take it for 
forensic study, and later refused to communicate with that person further. One of the deputies was supposed to be 
the local expert in high-tech crime. Moreover, the sheriffs office never entered that complaint in its crime report 
that it sends to Baton Rouge. 

Electronic stalking happens to victims of every gender, age, racial and ethnic group, color, political 
thought, philosophy, religious persuasion, economic bracket, and occupation. A sixty-year old mixed-race 
grandmother in New Orleans videotaped some actions of her organized stalkers from her own property. Instead of 
arresting the harassers, the police arrested the victim. She is awaiting sentencing at this moment (April, 2009). 

Do your own research by “Googling” the following key words and phrases: stalking (organized, gang, 
neighborhood); directed energy weapons, uses of RFID, electromagnetic forces, directed sound, targeted 
individuals, laser weapons, electronic assault, and microwave attacks. Some websites dedicate themselves to the 
topic of remote electronic assault and stalking. 

Victims number into the tens of thousands. Some experts place that number at well over two million. If 
you are not yet a victim, you could be next. Speak out against organized electronic stalking and the criminals who 
employ it. 


Targets may want to become still more defiant and join those patriots who refuse to 
pay state and national income taxes. Why pay taxes that contribute to your torture? 
Call it civil disobedience. Targets whose lives have been ruined have little to lose by 
taking the offensive. This is a war for survival, and a war has never been won by 
remaining on the defensive. Most targets by far are law abiding citizens who wish to 
live their lives in peace while preserving their privacy; yet, when law enforcement and 
the government fail them, it is time to consider other measures. 

However, whatever you do, it must be done in a calm deliberate manner. Do not lose 
your temper. Do not make threats. Do not appear to be a threat to anybody or to 
yourself. Remember that your handlers want you to acquire a police record or have 
you sent to a psychiatrist for an “evaluation.” Both go into your FBI file. 

Summary 

This paper is long. Let me summarize in few words the above material. Only 
governments and their power brokers (using taxpayer money) have the power, 
finances, manpower, and other resources required to invent, employ, and sustain in 
total secrecy the devices and methods used for electronic assault and mind control. 
Countries such as the United States, Israel, Russia, probably China, and others have 
long experimented with directed energy weapons and mind control. Only the 
government and the power brokers who control the government can direct the 
intelligence community and law enforcement on every level of government either to 
engage in ESMC or refuse to investigate it - perhaps both. OVERWHELMING 
EVIDENCE SHOUTS THAT ESMC MUST NECESSARILY INVOLVE THE FEDERAL 
GOVERNMENT. 



72 


Secrets of the atomic bomb, space craft, stealth air planes, and other cutting-edge, 
high-tech objects were very closely guarded for years; yet, eventually those secrets 
leaked out. Much attention is being focused on electronic and mind control assault 
and a massive amount of information is being disseminated concerning its origin. 
Some of that information is probably right on target; other “planted” misinformation 
probably only confuses the issue. The point is that one day, probably in the very near 
future, the secrets of electronic torture and mind control by remote will also be 
revealed. 

In the meantime, tens of thousands, perhaps hundreds of thousands of productive 
and intelligent American citizens fall victim of electronic and mind control assault. 
Their lives are ruined, and many of them lose their lives to that silent death or commit 
suicide. Most of those victims have already lost all faith in their government to protect 
them and have even lost their belief in democracy. I invite readers to study the cases 
of victims of electronic torture and mind control in the United States and then argue 
that those victims would be worse off under Chinese Communist, Iranian, or Russian 
rule than under so-called American democracy. If such electronic torture and mind 
control can take place in the cradle of democracy, why should targets support that 
democracy? 

As a longtime victim of electronic and mind control assault, I am now also a dissident 
American. My handlers sometimes tell me telepathically that I am an extremist and 
un-American. I reply that I am now indeed an extremist and that if THEY are 
Americans, I am now indeed most definitely UN-American. For the last time in this 
article, I repeat that electronic assault and mind control CANNOT be carried out 
without high-up government knowledge. Certain members of the national Executive, 
Branch of the government have to pull the ESMC strings. Government leaders who 
sponsor this type of sick socio-politico operative can never succeed. Instead, they 
create many dissidents and malcontents who will eventually weaken this government 
and bring it down. If targets have violated the law, let them be formally accused and 
be able to defend themselves before their accusers. That is the American way -- or it 
used to be. 


Post Note 

On April 25-26, a group of members of the Freedom from Covert Harassment and 
Surveillance underwent detection examinations by electronics experts in Boise, Idaho. 
The person originally chosen to conduct the examinations backed out due to 
telephoned threats and shots fired at him. Two other individuals administered the 
examinations. The result of my examination showed an enormous amount of EMF 
(electromagnetic force) and found the exact frequency along which it struck my body 
and mind. I shall follow up on those findings. While I was in Idaho, the handlers 
redoubled their electronic torture and mind control efforts. No surprise there, for that 
state is crawling with FBI agents posted there because of the number of Survivalists 
who seek sanctuary in the back country. 



73 


I do not follow any recognized religious faith. To me, there is only The Great Spirit and 
IT demands no clergy, no human-contrived dogma, no sacred book, no church, no 
frills. Unlike Christians, I do not believe in “turning the other cheek,” and I will not 
forgive my enemies. Instead, I intend to devote the remainder of my life to exposing 
the evil of electronic stalking and mind control and bringing down the conscienceless 
miscreants who practice it. That WILL happen. If family members and friends believed 
what targets tell them, there would be such a massive public outcry that the Federal 
Government would have to reveal all that it knows about electronic torture and mind 
control in the United States of America. Unfortunately for the victims, electronic torture 
and mind control appears so incredible that most people cannot believe it. 

This paper is based on my own experiences, a very long and lucid memory, my 
journal entries, in-depth and ongoing research, logic and reasoning, and 
correspondence with other targets. The opinions formed from those sources are my 
own. Should you wish to contact me, my email address is 

mindovermonster@vahoo.com .